Skip to main content

HTTP STATUS CODES - Information Codes, Successful Codes, Redirection Codes, Client Error Codes, Server Error Codes, Request Methods

HTTP STATUS CODES

HTTP Status Codes
(Image Source - Google Images)


1XX = HTTP Information Codes:
    -100 : Continue
    -101 : Switching Protocols
    -102 : Processing
    -103 : Checkpoint
    -122 : Request-URI too Long


2XX = HTTP Successful Codes:
    -200 : OK
    -201 : Created
    -202 : Accepted
    -203 : Non-Authoritative Information
    -204 : No Content
    -205 : Reset Content
    -206 : Partial Content
    -207 : Multi-Status
    -208 : Already Reported
    -226 : IM Used


3XX = HTTP Redirection Codes:
    -300 : Multiple Choices
    -301 : Moved Permanently
    -302 : Found
    -303 : See Other
    -304 : Not Modified
    -305 : Use Proxy
    -306 : Switch Proxy
    -307 : Temporary Redirect
    -308 : Permanent Redirect


4XX = HTTP Client Error Codes:
    -400 : Bad Request
    -401 : Unauthorized
    -402 : Payment Required
    -403 : Forbidden
    -404 : Not Found
    -405 : Method Not Allowed
    -406 : Not Acceptable
    -407 : Proxy Authentication Required
    -408 : Request Timeout
    -409 : Conflict
    -410 : Gone
    -411 : Length Required
    -412 : Precondition Failed
    -413 : Request Entity too large
    -414 : Request URI too long
    -415 : Unsupported Media Type
    -416 : Request Range not
    -417 : Expectation Failed
    -418 : I am a teapot
    -422 : Un-processable Entity
    -423 : Locked
    -424 : Failed Dependency
    -425 : Unordered Collection
    -426 : Upgrade Required
    -428 : Precondition Required
    -429 : Too Many Requests
    -431 : Request Header Fields too large
    -444 : No Response
    -449 : Retry With
    -450 : Blocked by Windows Parental Controls
    -451 : Unavailable for Legal
    -499 : Client Closed Request
 

5XX = HTTP Server Error Codes:
    -500 : Internal Server Error
    -501 : Not Implemented
    -502 : Bad Gateway
    -503 : Service Unavailable
    -504 : Gateway Timeout
    -505 : HTTP Version Not Supported
    -506 : Variant Also Negotiates
    -507 : Insufficient Storage
    -508 : Loop Detected
    -509 : Bandwidth Limit Exceed
    -510 : Not Extended
    -511 : Network Authentication Required
    -598 : Network Read Timeout Error
    -599 : Network Connect Timeout Error


HTTP Request Methods:
    -GET : Requests a representation of the specified resource.
    -POST : Requests the Server to accept the entity enclosed in the request.
    -HEAD : Request similar to GET but without the response body.
    -PUT : Requests to store the enclosed entity to supplied URI.
    -DELETE : Delete the specified resource
    -OPTIONS : Returns the HTTP Methods supported by the server for URL Specified.
    -CONNECT : Starts a two-way communication with requested resource.

Comments

Popular posts from this blog

How To Make Symbols With Keyboard

HOW TO MAKE SYMBOLS WITH A KEYBOARD (Image By - Sharma Guides | Subham232330) Alt + 0153 :   ™  (trademark symbol) Alt + 0169 :   ©  (copyright symbol) Alt + 0174 :   ®  (registered trademark symbol) Alt + 0176 :   °  (degree symbol) Alt + 0177 :  ±  (plus-or-minus sign) Alt + 0182 :   ¶  (paragraph mark) Alt + 0190 :   ¾  (fraction, three-fourths) Alt + 0215 :   × (multiplication sign) Alt + 0162 :   ¢  (thecent sign) Alt + 0161 :   ¡  (upside down exclamation point) Alt + 0191 :   ¿  (upside down question mark) Alt + 1 : ☺ (smiley face) Alt + 2 :   ☻ (black smiley face) Alt + 15 :   ☼  (Sun) Alt + 12 :   ♀  (female sign) Alt + 11 :   ♂  (male sign) Alt + 6 :   ♠  (spade) Alt + 5 :   ♣  (Club) Alt + 3 :   ♥  (Heart) Alt + 4 :   ♦  (Diamond) Alt + 13 :   ♪  (eighth note...

Natural Language Processing (NLP)

What is Natural Language Processing (NLP) ? Natural Language Processing (NLP)* is a field of artificial intelligence (AI) that focuses on the interaction between computers and humans using natural language. It involves the development of algorithms and models that enable computers to understand, interpret, and generate human language. Here are key aspects of NLP: 1. *Text Understanding:* NLP systems aim to comprehend the meaning of written or spoken language. This involves tasks such as text classification, sentiment analysis, and named entity recognition. 2. *Speech Recognition:* NLP extends to processing spoken language, converting audio signals into text. This technology is used in voice assistants, transcription services, and more. 3. *Language Generation:* NLP systems can generate human-like text. This is employed in chatbots, language translation services, and content generation. 4. *Machine Translation:* NLP is fundamental to machine translation systems that enable the automatic...

Access Control Methods in DBMS

Access control in DBMS Database access control is a method of allowing access to a company’s sensitive data only to those people (database users) who are allowed to access such data and to restrict access to unauthorized persons. It includes two main components: authentication and authorization. Authentication is a method of verifying the identity of a person who is accessing your database. Note that authentication isn’t enough to protect data. An additional layer of security is required, authorization, which determines whether a user should be allowed to access the data or make the transaction he’s attempting. Without authentication and authorization, there is no data security. Any company whose employees connect to the Internet, thus, every company today, needs some level of access control implemented. Types of Access Control Obsolete access models include Discretionary Access Control (DAC) and Mandatory Access Control (MAC). Role Based Access Control (RBAC) is the most common method...