{"id":4447,"date":"2024-04-09T15:36:57","date_gmt":"2024-04-09T13:36:57","guid":{"rendered":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/?p=4447"},"modified":"2024-04-09T15:38:55","modified_gmt":"2024-04-09T13:38:55","slug":"codigos-error-http","status":"publish","type":"post","link":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/codigos-error-http","title":{"rendered":"Una gu\u00eda sobre c\u00f3digos de error HTTP"},"content":{"rendered":"\n<p>El mundo de internet funciona gracias a un complejo sistema de comunicaci\u00f3n. Al igual que las personas nos comunicamos mediante palabras y se\u00f1ales, los dispositivos utilizan c\u00f3digos para intercambiar informaci\u00f3n. En el caso de la web, el <strong>protocolo HTTP<\/strong> (Protocolo de Transferencia de Hipertexto) es la base de esta comunicaci\u00f3n.<\/p>\n<p>Dentro del <strong>protocolo HTTP<\/strong>, existen los c\u00f3digos de error, mensajes especiales que brindan informaci\u00f3n valiosa sobre el estado de una solicitud realizada a un servidor. Al comprender estos c\u00f3digos, podemos descifrar el lenguaje de la web y reaccionar ante diferentes situaciones.<\/p>\n<p>Este art\u00edculo te guiar\u00e1 a trav\u00e9s de los c\u00f3digos de error HTTP m\u00e1s comunes, explicando su significado y brindando ejemplos del mundo real para una mejor comprensi\u00f3n.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_72 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/codigos-error-http\/#Entendiendo_los_diferentes_tipos_de_codigos_de_error_HTTP\" title=\"Entendiendo los diferentes tipos de c\u00f3digos de error HTTP\">Entendiendo los diferentes tipos de c\u00f3digos de error HTTP<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/codigos-error-http\/#Ejemplos_del_mundo_real_para_comprender_mejor_los_codigos_de_error_HTTP\" title=\"Ejemplos del mundo real para comprender mejor los c\u00f3digos de error HTTP\">Ejemplos del mundo real para comprender mejor los c\u00f3digos de error HTTP<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/codigos-error-http\/#La_importancia_de_los_codigos_de_error_HTTP_para_un_internet_mas_fluido\" title=\"La importancia de los c\u00f3digos de error HTTP para un internet m\u00e1s fluido\">La importancia de los c\u00f3digos de error HTTP para un internet m\u00e1s fluido<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Entendiendo_los_diferentes_tipos_de_codigos_de_error_HTTP\"><\/span><strong>Entendiendo los diferentes tipos de c\u00f3digos de error HTTP<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Los c\u00f3digos de error HTTP se agrupan en categor\u00edas seg\u00fan el tipo de respuesta que brindan:<\/p>\n<ul>\n<li><strong>1xx Informational (Informativos):<\/strong> Estos c\u00f3digos indican que la solicitud inicial ha sido recibida y el proceso contin\u00faa. Un ejemplo es el c\u00f3digo 100 Continue, utilizado habitualmente para transferencias de archivos grandes.<\/li>\n<li><strong>2xx Success (\u00c9xito):<\/strong> Las respuestas exitosas comienzan con 2. El c\u00f3digo m\u00e1s com\u00fan es el 200 OK, que indica que la solicitud se proces\u00f3 con \u00e9xito y el servidor ha devuelto el recurso solicitado (por ejemplo, una p\u00e1gina web).<\/li>\n<li><strong>3xx Redirection (Redirecci\u00f3n):<\/strong> Estos c\u00f3digos se\u00f1alan que el recurso solicitado se encuentra en una ubicaci\u00f3n diferente. El c\u00f3digo 301 Moved Permanently indica que el recurso se ha movido permanentemente, mientras que el 302 Found indica un traslado temporal.<\/li>\n<li><strong>4xx Client Error (Error del Cliente):<\/strong> Los c\u00f3digos 4xx se\u00f1alan un error en la solicitud realizada por el cliente (navegador web, aplicaci\u00f3n m\u00f3vil, etc.). El famoso 404 Not Found indica que el recurso solicitado no existe en el servidor. Otro com\u00fan es el 401 Unauthorized, que surge cuando se intenta acceder a un recurso protegido sin credenciales v\u00e1lidas.<\/li>\n<li><strong>5xx Server Error (Error del Servidor):<\/strong> Las respuestas con c\u00f3digo 5xx indican un problema en el servidor que impide procesar la solicitud. El 500 Internal Server Error es un mensaje gen\u00e9rico que se\u00f1ala un error interno, mientras que el 503 Service Unavailable indica que el servidor se encuentra temporalmente indisponible debido a sobrecarga o mantenimiento.<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"Ejemplos_del_mundo_real_para_comprender_mejor_los_codigos_de_error_HTTP\"><\/span><strong>Ejemplos del mundo real para comprender mejor los c\u00f3digos de error HTTP<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Imaginemos las siguientes situaciones:<\/p>\n<ul>\n<li><strong>Inicio de sesi\u00f3n fallido<\/strong>: Intentas acceder a un \u00e1rea restringida de un sitio web sin iniciar sesi\u00f3n. El servidor responde con un c\u00f3digo 401 Unauthorized, indicando que necesitas credenciales v\u00e1lidas para continuar. El sitio web te solicitar\u00e1 que inicies sesi\u00f3n o proporciones la informaci\u00f3n necesaria.<\/li>\n<li><strong>P\u00e1gina no encontrada<\/strong>: Ingresas una direcci\u00f3n web incorrecta o intentas acceder a una p\u00e1gina que ha sido eliminada. El servidor devuelve un c\u00f3digo 404 Not Found. El sitio web te mostrar\u00e1 una p\u00e1gina de error personalizada o te sugerir\u00e1 alternativas.<\/li>\n<li><strong>Servidor sobrecargado<\/strong>: Accedes a un sitio web muy popular durante un evento importante, generando un tr\u00e1fico masivo. El servidor se sobrecarga y responde con un <strong>c\u00f3digo 503 Service Unavailable<\/strong>. La p\u00e1gina web te informar\u00e1 que el servicio no est\u00e1 disponible temporalmente y te sugerir\u00e1 volver a intentarlo m\u00e1s tarde.<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"La_importancia_de_los_codigos_de_error_HTTP_para_un_internet_mas_fluido\"><\/span><strong>La importancia de los c\u00f3digos de error HTTP para un internet m\u00e1s fluido<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Los <strong>c\u00f3digos de error HTTP<\/strong> son fundamentales para una comunicaci\u00f3n fluida en la web. Permiten a servidores y clientes intercambiar informaci\u00f3n precisa sobre el estado de una solicitud.<\/p>\n<ul>\n<li><strong>Para los desarrolladores<\/strong>: Al comprender estos c\u00f3digos, pueden implementar mecanismos para manejar errores de forma adecuada, guiar a los usuarios con mensajes informativos y garantizar una experiencia de navegaci\u00f3n sin interrupciones.<\/li>\n<li><strong>Para los usuarios:<\/strong> Conocer el significado b\u00e1sico de algunos c\u00f3digos de error comunes, como el 404 Not Found o el 503 Service Unavailable, te ayuda a interpretar lo que sucede cuando te encuentras con una p\u00e1gina de error y a reaccionar en consecuencia (intentar de nuevo m\u00e1s tarde, buscar la informaci\u00f3n en otro lugar, etc.).<\/li>\n<\/ul>\n<p>Si os ha gustado el art\u00edculo os dejo aqu\u00ed mi <a href=\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/autores\/juan-rios\/\" target=\"_blank\" rel=\"noopener\">perfil de INESEM: Juan R\u00edos.<\/a>\u00a0Tambi\u00e9n puedes pasarte a leer este art\u00edculo sobre <strong><a href=\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/que-es-una-api\/\" target=\"_blank\" rel=\"noopener\">qu\u00e9 es una API y sus ventajas<\/a>.\u00a0<\/strong><\/p>\n<p>\u00bfTe gustar\u00eda conocer m\u00e1s sobre este campo? \u00a1No te pierdas este <a href=\"https:\/\/www.inesem.es\/Master-En-Diseno-Grafico-Web-Y-Multimedia\" target=\"_blank\" rel=\"noopener\">M\u00e1ster en Dise\u00f1o gr\u00e1fico y web multimedia<\/a> o este <a href=\"https:\/\/www.inesem.es\/Curso-Superior-Html-Css-Desarrollo-Web-Responsive\" target=\"_blank\" rel=\"noopener\">Curso Superior en Desarrollo Web Responsive: HTML5 Y CSS3<\/a>!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>El mundo de internet funciona gracias a un complejo sistema de comunicaci\u00f3n. Los dispositivos utilizan c\u00f3digos para intercambiar informaci\u00f3n.<\/p>\n","protected":false},"author":91961,"featured_media":4448,"comment_status":"open","ping_status":"open","sticky":true,"template":"","format":"standard","meta":{"footnotes":""},"categories":[729],"class_list":["post-4447","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-analisis-de-datos"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Una gu\u00eda sobre c\u00f3digos de error HTTP<\/title>\n<meta name=\"description\" content=\"El mundo de internet funciona gracias a un complejo sistema de comunicaci\u00f3n. Los dispositivos utilizan c\u00f3digos para intercambiar informaci\u00f3n.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/codigos-error-http\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Una gu\u00eda sobre c\u00f3digos de error HTTP\" \/>\n<meta property=\"og:description\" content=\"El mundo de internet funciona gracias a un complejo sistema de comunicaci\u00f3n. Los dispositivos utilizan c\u00f3digos para intercambiar informaci\u00f3n.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/codigos-error-http\" \/>\n<meta property=\"og:site_name\" content=\"Canal Inform\u00e1tica y TICS\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/InesemBusinessSchool\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-09T13:36:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-09T13:38:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2024\/04\/404http.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1680\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Juan R\u00edos\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@inesem\" \/>\n<meta name=\"twitter:site\" content=\"@inesem\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Juan R\u00edos\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/codigos-error-http#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/codigos-error-http\"},\"author\":{\"name\":\"Juan R\u00edos\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/person\/60415ccb9331166b75a8c7ca7c59d0f5\"},\"headline\":\"Una gu\u00eda sobre c\u00f3digos de error HTTP\",\"datePublished\":\"2024-04-09T13:36:57+00:00\",\"dateModified\":\"2024-04-09T13:38:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/codigos-error-http\"},\"wordCount\":770,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/codigos-error-http#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2024\/04\/404http.png\",\"articleSection\":[\"An\u00e1lisis de Datos\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/codigos-error-http#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/codigos-error-http\",\"url\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/codigos-error-http\",\"name\":\"Una gu\u00eda sobre c\u00f3digos de error HTTP\",\"isPartOf\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/codigos-error-http#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/codigos-error-http#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2024\/04\/404http.png\",\"datePublished\":\"2024-04-09T13:36:57+00:00\",\"dateModified\":\"2024-04-09T13:38:55+00:00\",\"description\":\"El mundo de internet funciona gracias a un complejo sistema de comunicaci\u00f3n. Los dispositivos utilizan c\u00f3digos para intercambiar informaci\u00f3n.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/codigos-error-http#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/codigos-error-http\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/codigos-error-http#primaryimage\",\"url\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2024\/04\/404http.png\",\"contentUrl\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2024\/04\/404http.png\",\"width\":1680,\"height\":1080,\"caption\":\"Error HTTP\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/codigos-error-http#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"An\u00e1lisis de Datos\",\"item\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/categorias\/analisis-de-datos\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Una gu\u00eda sobre c\u00f3digos de error HTTP\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#website\",\"url\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/\",\"name\":\"Canal Inform\u00e1tica y TICS\",\"description\":\"Canal de Noticias gestionado por el Departamento Docente de Inform\u00e1tica y TICS de INESEM\",\"publisher\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#organization\",\"name\":\"Canal Inform\u00e1tica y TICS\",\"url\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/logo\/image\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Canal Inform\u00e1tica y TICS\"},\"image\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/InesemBusinessSchool\/\",\"https:\/\/x.com\/inesem\",\"http:\/\/www.linkedin.com\/company\/2370697\",\"https:\/\/www.youtube.com\/user\/inesembusinesschool\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/person\/60415ccb9331166b75a8c7ca7c59d0f5\",\"name\":\"Juan R\u00edos\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/08\/Rios-Juan-recorte-96x96.png\",\"contentUrl\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/08\/Rios-Juan-recorte-96x96.png\",\"caption\":\"Juan R\u00edos\"},\"url\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/autores\/juan-rios\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Una gu\u00eda sobre c\u00f3digos de error HTTP","description":"El mundo de internet funciona gracias a un complejo sistema de comunicaci\u00f3n. Los dispositivos utilizan c\u00f3digos para intercambiar informaci\u00f3n.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/codigos-error-http","og_locale":"es_ES","og_type":"article","og_title":"Una gu\u00eda sobre c\u00f3digos de error HTTP","og_description":"El mundo de internet funciona gracias a un complejo sistema de comunicaci\u00f3n. Los dispositivos utilizan c\u00f3digos para intercambiar informaci\u00f3n.","og_url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/codigos-error-http","og_site_name":"Canal Inform\u00e1tica y TICS","article_publisher":"https:\/\/www.facebook.com\/InesemBusinessSchool\/","article_published_time":"2024-04-09T13:36:57+00:00","article_modified_time":"2024-04-09T13:38:55+00:00","og_image":[{"width":1680,"height":1080,"url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2024\/04\/404http.png","type":"image\/png"}],"author":"Juan R\u00edos","twitter_card":"summary_large_image","twitter_creator":"@inesem","twitter_site":"@inesem","twitter_misc":{"Escrito por":"Juan R\u00edos","Tiempo de lectura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/codigos-error-http#article","isPartOf":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/codigos-error-http"},"author":{"name":"Juan R\u00edos","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/person\/60415ccb9331166b75a8c7ca7c59d0f5"},"headline":"Una gu\u00eda sobre c\u00f3digos de error HTTP","datePublished":"2024-04-09T13:36:57+00:00","dateModified":"2024-04-09T13:38:55+00:00","mainEntityOfPage":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/codigos-error-http"},"wordCount":770,"commentCount":0,"publisher":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#organization"},"image":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/codigos-error-http#primaryimage"},"thumbnailUrl":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2024\/04\/404http.png","articleSection":["An\u00e1lisis de Datos"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/codigos-error-http#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/codigos-error-http","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/codigos-error-http","name":"Una gu\u00eda sobre c\u00f3digos de error HTTP","isPartOf":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/codigos-error-http#primaryimage"},"image":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/codigos-error-http#primaryimage"},"thumbnailUrl":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2024\/04\/404http.png","datePublished":"2024-04-09T13:36:57+00:00","dateModified":"2024-04-09T13:38:55+00:00","description":"El mundo de internet funciona gracias a un complejo sistema de comunicaci\u00f3n. Los dispositivos utilizan c\u00f3digos para intercambiar informaci\u00f3n.","breadcrumb":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/codigos-error-http#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/codigos-error-http"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/codigos-error-http#primaryimage","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2024\/04\/404http.png","contentUrl":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2024\/04\/404http.png","width":1680,"height":1080,"caption":"Error HTTP"},{"@type":"BreadcrumbList","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/codigos-error-http#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/"},{"@type":"ListItem","position":2,"name":"An\u00e1lisis de Datos","item":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/categorias\/analisis-de-datos"},{"@type":"ListItem","position":3,"name":"Una gu\u00eda sobre c\u00f3digos de error HTTP"}]},{"@type":"WebSite","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#website","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/","name":"Canal Inform\u00e1tica y TICS","description":"Canal de Noticias gestionado por el Departamento Docente de Inform\u00e1tica y TICS de INESEM","publisher":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#organization","name":"Canal Inform\u00e1tica y TICS","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Canal Inform\u00e1tica y TICS"},"image":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/InesemBusinessSchool\/","https:\/\/x.com\/inesem","http:\/\/www.linkedin.com\/company\/2370697","https:\/\/www.youtube.com\/user\/inesembusinesschool\/"]},{"@type":"Person","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/person\/60415ccb9331166b75a8c7ca7c59d0f5","name":"Juan R\u00edos","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/person\/image\/","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/08\/Rios-Juan-recorte-96x96.png","contentUrl":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/08\/Rios-Juan-recorte-96x96.png","caption":"Juan R\u00edos"},"url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/autores\/juan-rios"}]}},"autor_name":{"name":"Juan R\u00edos"},"featured_image":{"attachment_meta":{"width":1680,"height":1080,"file":"2024\/04\/404http.png","sizes":{"medium":{"file":"404http-175x113.png","width":175,"height":113,"mime_type":"image\/png","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2024\/04\/404http-175x113.png"},"large":{"file":"404http-1020x656.png","width":1020,"height":656,"mime_type":"image\/png","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2024\/04\/404http-1020x656.png"},"thumbnail":{"file":"404http-345x180.png","width":345,"height":180,"mime_type":"image\/png","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2024\/04\/404http-345x180.png"},"medium_large":{"file":"404http-768x494.png","width":768,"height":494,"mime_type":"image\/png","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2024\/04\/404http-768x494.png"},"wysija-newsletters-max":{"file":"404http-600x386.png","width":600,"height":386,"mime_type":"image\/png","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2024\/04\/404http-600x386.png"},"1536x1536":{"file":"404http-1536x987.png","width":1536,"height":987,"mime_type":"image\/png","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2024\/04\/404http-1536x987.png"},"thumb-small":{"file":"404http-80x80.png","width":80,"height":80,"mime_type":"image\/png","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2024\/04\/404http-80x80.png"},"thumb-standard":{"file":"404http-320x320.png","width":320,"height":320,"mime_type":"image\/png","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2024\/04\/404http-320x320.png"},"thumb-medium":{"file":"404http-520x245.png","width":520,"height":245,"mime_type":"image\/png","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2024\/04\/404http-520x245.png"},"thumb-large":{"file":"404http-720x340.png","width":720,"height":340,"mime_type":"image\/png","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2024\/04\/404http-720x340.png"},"thumb-anteriores":{"file":"404http-230x163.png","width":230,"height":163,"mime_type":"image\/png","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2024\/04\/404http-230x163.png"},"thumb-inverso":{"file":"404http-369x261.png","width":369,"height":261,"mime_type":"image\/png","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2024\/04\/404http-369x261.png"},"thumb-cercano":{"file":"404http-650x200.png","width":650,"height":200,"mime_type":"image\/png","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2024\/04\/404http-650x200.png"},"thumb-slider":{"file":"404http-574x430.png","width":574,"height":430,"mime_type":"image\/png","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2024\/04\/404http-574x430.png"},"thumb-busqueda":{"file":"404http-580x375.png","width":580,"height":375,"mime_type":"image\/png","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2024\/04\/404http-580x375.png"},"thumb-formacion-continua":{"file":"404http-440x336.png","width":440,"height":336,"mime_type":"image\/png","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2024\/04\/404http-440x336.png"},"thumb-xlarge":{"file":"404http-980x450.png","width":980,"height":450,"mime_type":"image\/png","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2024\/04\/404http-980x450.png"},"thumb-xxlarge":{"file":"404http-1320x500.png","width":1320,"height":500,"mime_type":"image\/png","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2024\/04\/404http-1320x500.png"}},"image_meta":{"aperture":"0","credit":"","camera":"","caption":"","created_timestamp":"0","copyright":"","focal_length":"0","iso":"0","shutter_speed":"0","title":"","orientation":"0","keywords":[]}}},"_links":{"self":[{"href":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/wp-json\/wp\/v2\/posts\/4447"}],"collection":[{"href":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/wp-json\/wp\/v2\/users\/91961"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/wp-json\/wp\/v2\/comments?post=4447"}],"version-history":[{"count":0,"href":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/wp-json\/wp\/v2\/posts\/4447\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/wp-json\/wp\/v2\/media\/4448"}],"wp:attachment":[{"href":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/wp-json\/wp\/v2\/media?parent=4447"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/wp-json\/wp\/v2\/categories?post=4447"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}