{"id":18080,"date":"2023-10-31T11:29:06","date_gmt":"2023-10-31T11:29:06","guid":{"rendered":"https:\/\/www.prepbytes.com\/blog\/?p=18080"},"modified":"2023-10-31T11:29:06","modified_gmt":"2023-10-31T11:29:06","slug":"unix-interview-questions","status":"publish","type":"post","link":"https:\/\/prepbytes.com\/blog\/unix-interview-questions\/","title":{"rendered":"Unix Interview Questions"},"content":{"rendered":"<p>UNIX, an operating system with a rich history dating back to the 1960s, continues to be a fundamental part of the computing world. For job seekers in fields like system administration, software development, and DevOps, UNIX skills are highly sought after. To help you prepare for UNIX-related interviews, here are the top 25 UNIX interview questions.<\/p>\n<h2>Unix Interview Questions and Answers<\/h2>\n<p>Unix Interview Questions and Answers are discussed below:<\/p>\n<p><strong>1. What is UNIX?<\/strong><br \/>\nUNIX is a family of multitasking, multiuser computer operating systems originally developed in the 1960s at AT&amp;T&#8217;s Bell Labs. It&#8217;s known for its robustness, security, and versatility and has been the basis for various operating systems, including Linux and macOS.<\/p>\n<p><strong>2. Explain the difference between UNIX and Linux.<\/strong><br \/>\nWhile both UNIX and Linux are Unix-like operating systems, UNIX typically refers to commercial versions, while Linux is open source. Linux is a UNIX-like operating system that is freely available and has many distributions, like Ubuntu and CentOS.<\/p>\n<p><strong>3. What are some common UNIX flavors?<\/strong><br \/>\nCommon UNIX flavors include AIX (IBM), Solaris (formerly Sun Microsystems, now Oracle), HP-UX (Hewlett Packard), and macOS (Apple). Additionally, there are various Linux distributions, such as Ubuntu, CentOS, and Debian.<\/p>\n<p><strong>4. What is a shell in UNIX?<\/strong><br \/>\nA shell is a command-line interface that allows users to interact with the UNIX operating system. Popular shells include Bash (Bourne-Again Shell), Zsh (Z Shell), and Korn (KornShell).<\/p>\n<p><strong>5. How do you list files in a directory in UNIX?<\/strong><br \/>\nThe ls command is used to list files and directories in UNIX. For example, ls -l displays detailed information about files and directories in the current directory.<\/p>\n<p><strong>6. What is a PID in UNIX?<\/strong><br \/>\nPID stands for Process Identifier. It is a unique number assigned to each running process in UNIX. PIDs are used to manage and identify processes, making it easier to start, stop, or monitor them.<\/p>\n<p><strong>7. Explain the chmod command in UNIX.<\/strong><br \/>\nThe chmod command is used to change file permissions in UNIX. It allows you to specify who can read, write, or execute a file. For example, chmod 755 file.txt grants read, write, and execute permissions to the owner and read and execute permissions to others.<\/p>\n<p><strong>8. How do you search for a file in UNIX?<\/strong><br \/>\nThe find command is used to search for files and directories in UNIX. For instance, find \/path\/to\/search -name filename searches for a file named &quot;filename&quot; under the specified path.<\/p>\n<p><strong>9. What is a symbolic link in UNIX?<\/strong><br \/>\nA symbolic link (or symlink) is a reference to another file or directory. It acts as a pointer, allowing you to access the target file or directory from multiple locations. The ln -s command creates symbolic links.<\/p>\n<p><strong>10. Explain the purpose of the \/etc\/passwd file in UNIX.<\/strong><br \/>\nThe \/etc\/passwd file stores user account information, including usernames, user IDs (UIDs), home directories, and default shells. It is essential for user authentication and system administration.<\/p>\n<p><strong>11. What is the grep command used for in UNIX?<\/strong><br \/>\nThe grep command is used for text searching and manipulation. It searches for patterns in text files and displays matching lines. For instance, grep &quot;pattern&quot; file.txt searches for &quot;pattern&quot; in the file &quot;file.txt.&quot;<\/p>\n<p><strong>12. What is the purpose of the \/etc\/hosts file in UNIX?<\/strong><br \/>\nThe \/etc\/hosts file maps hostnames to IP addresses. It is used for local DNS resolution, allowing users to specify custom host-to-IP mappings.<\/p>\n<p><strong>13. Explain the concept of a pipe (|) in UNIX.<\/strong><br \/>\nA pipe is used to connect the standard output of one command to the standard input of another. For example, command1 | command2 takes the output of command1 and feeds it as input to command2.<\/p>\n<p><strong>14. What is a shell script in UNIX?<\/strong><br \/>\nA shell script is a series of UNIX commands saved in a script file. It can be executed as a single command, automating repetitive tasks and complex operations.<\/p>\n<p><strong>15. What is the purpose of the cron utility in UNIX?<\/strong><br \/>\nCron is a time-based job scheduler in UNIX. It allows users to schedule tasks to run at specified intervals, such as daily, weekly, or monthly.<\/p>\n<p><strong>16. Explain the significance of tar in UNIX.<\/strong><br \/>\nThe tar command is used for archiving files and directories in UNIX. It can create, extract, and compress archive files. For example, tar -cvf archive.tar files\/ creates an archive of the &quot;files&quot; directory.<\/p>\n<p><strong>17. What is SSH in UNIX?<\/strong><br \/>\nSSH (Secure Shell) is a network protocol used to secure remote access to UNIX-like systems. It provides encrypted communication for secure login, file transfer, and remote command execution.<\/p>\n<p><strong>18. How do you check system resource usage in UNIX?<\/strong><br \/>\nThe top command displays real-time information about system resource usage, including CPU, memory, and processes. Pressing &#8216;q&#8217; exits the top command.<\/p>\n<p><strong>19. Explain the purpose of \/dev\/null in UNIX.<\/strong><br \/>\n\/dev\/null is a special file that discards data written to it. It is often used to suppress output or as a placeholder for unwanted data.<\/p>\n<p><strong>20. What is the significance of the passwd command in UNIX?<\/strong><br \/>\nThe passwd command is used to change a user&#8217;s password in UNIX. Users can use it to set or update their passwords securely.<\/p>\n<p><strong>21. What is the purpose of the umask command in UNIX, and how does it work?<\/strong><br \/>\nThe umask command is used to set the default file permissions for newly created files and directories. It subtracts the specified permissions from the maximum permissions (usually 777 for directories and 666 for files) to determine the default permissions.<\/p>\n<p><strong>22. Explain the concept of environment variables in UNIX. How can you set and display environment variables?<\/strong><br \/>\nEnvironment variables are values that can be accessed by processes and shell scripts to customize the behavior of the environment. You can set environment variables using the export command, and you can display them using the echo $VARIABLE_NAME command.<\/p>\n<p><strong>23. What is a daemon in UNIX, and why are daemons important?<\/strong><br \/>\nIn UNIX, a daemon is a background process that runs independently of the user&#8217;s session and performs various system tasks. Daemons are crucial for tasks like managing hardware, network services, and scheduling jobs, as they operate without user intervention.<\/p>\n<p><strong>24. What is the purpose of the awk command in UNIX, and how can it be used?<\/strong><br \/>\nawk is a versatile text-processing tool used for pattern scanning and processing. It is commonly used for tasks like data extraction, manipulation, and reporting. You can use it to specify patterns and actions to perform on matching lines of text in files or data streams.<\/p>\n<p><strong>25. How can you check the disk space usage in UNIX, and what command would you use to identify directories consuming the most space?<\/strong><br \/>\nYou can check disk space usage in UNIX using the df command, which displays file system disk space usage. To identify directories consuming the most space, you can use the du (disk usage) command with options like -h (human-readable) and -s (summary).<\/p>\n<p><strong>Conclusion<\/strong><br \/>\nUNIX is a timeless and influential operating system that has shaped the computing landscape for decades. For job seekers and professionals in various IT domains, knowledge of UNIX is indispensable. In this article, we covered 25 key UNIX interview questions, spanning a wide range of topics from basic commands to advanced concepts. Preparing for these questions can help you stand out during UNIX-related interviews and pave the way for a successful career in fields like system administration, software development, and DevOps.<\/p>\n<h2>Frequently Asked Questions Related to Unix Interview Questions<\/h2>\n<p>Some frequently asked questions (FAQs) related to UNIX are:<\/p>\n<p><strong>1. Is UNIX the same as Linux?<\/strong><br \/>\nNo, UNIX and Linux are not the same. UNIX is a family of operating systems that includes commercial variants like AIX, Solaris, and HP-UX, while Linux is an open-source Unix-like operating system with various distributions.<\/p>\n<p><strong>2. What are some popular UNIX shells besides Bash?<\/strong><br \/>\nBesides Bash, other popular UNIX shells include Zsh (Z Shell), Korn (KornShell), and Csh (C Shell).<\/p>\n<p><strong>3. Can you run graphical applications in a UNIX environment?<\/strong><br \/>\nYes, UNIX environments support graphical applications through X Window System (X11) or display protocols like SSH X11 forwarding.<\/p>\n<p><strong>4. How can you kill a process in UNIX?<\/strong><br \/>\nYou can use the kill command followed by the process ID (PID) or send a specific signal to terminate a process. The default signal is SIGTERM (15), which requests a graceful termination, while SIGKILL (9) forcefully terminates a process.<\/p>\n<p><strong>5. What is the purpose of the \/etc\/shadow file in UNIX?<\/strong><br \/>\nThe \/etc\/shadow file stores secure password information for user accounts, including encrypted passwords and password expiration details. It enhances password security compared to the older \/etc\/passwd file.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>UNIX, an operating system with a rich history dating back to the 1960s, continues to be a fundamental part of the computing world. For job seekers in fields like system administration, software development, and DevOps, UNIX skills are highly sought after. To help you prepare for UNIX-related interviews, here are the top 25 UNIX interview [&hellip;]<\/p>\n","protected":false},"author":52,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[147],"tags":[],"class_list":["post-18080","post","type-post","status-publish","format-standard","hentry","category-interview-questions"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Unix Interview Questions<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/prepbytes.com\/blog\/unix-interview-questions\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Unix Interview Questions\" \/>\n<meta property=\"og:description\" content=\"UNIX, an operating system with a rich history dating back to the 1960s, continues to be a fundamental part of the computing world. For job seekers in fields like system administration, software development, and DevOps, UNIX skills are highly sought after. To help you prepare for UNIX-related interviews, here are the top 25 UNIX interview [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/prepbytes.com\/blog\/unix-interview-questions\/\" \/>\n<meta property=\"og:site_name\" content=\"PrepBytes Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/prepbytes0211\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-31T11:29:06+00:00\" \/>\n<meta name=\"author\" content=\"Prepbytes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Prepbytes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/prepbytes.com\/blog\/unix-interview-questions\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/prepbytes.com\/blog\/unix-interview-questions\/\"},\"author\":{\"name\":\"Prepbytes\",\"@id\":\"http:\/\/43.205.93.38\/#\/schema\/person\/3f7dc4ae851791d5947a7f99df363d5e\"},\"headline\":\"Unix Interview Questions\",\"datePublished\":\"2023-10-31T11:29:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/prepbytes.com\/blog\/unix-interview-questions\/\"},\"wordCount\":1414,\"commentCount\":0,\"publisher\":{\"@id\":\"http:\/\/43.205.93.38\/#organization\"},\"articleSection\":[\"Interview Questions\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/prepbytes.com\/blog\/unix-interview-questions\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/prepbytes.com\/blog\/unix-interview-questions\/\",\"url\":\"https:\/\/prepbytes.com\/blog\/unix-interview-questions\/\",\"name\":\"Unix Interview Questions\",\"isPartOf\":{\"@id\":\"http:\/\/43.205.93.38\/#website\"},\"datePublished\":\"2023-10-31T11:29:06+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/prepbytes.com\/blog\/unix-interview-questions\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/prepbytes.com\/blog\/unix-interview-questions\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/prepbytes.com\/blog\/unix-interview-questions\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"http:\/\/43.205.93.38\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Interview Questions\",\"item\":\"https:\/\/prepbytes.com\/blog\/category\/interview-questions\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Unix Interview Questions\"}]},{\"@type\":\"WebSite\",\"@id\":\"http:\/\/43.205.93.38\/#website\",\"url\":\"http:\/\/43.205.93.38\/\",\"name\":\"PrepBytes Blog\",\"description\":\"ONE-STOP RESOURCE FOR EVERYTHING RELATED TO CODING\",\"publisher\":{\"@id\":\"http:\/\/43.205.93.38\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"http:\/\/43.205.93.38\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"http:\/\/43.205.93.38\/#organization\",\"name\":\"Prepbytes\",\"url\":\"http:\/\/43.205.93.38\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"http:\/\/43.205.93.38\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.prepbytes.com\/wp-content\/uploads\/2025\/07\/uzxxllgloialmn9mhwfe.webp\",\"contentUrl\":\"https:\/\/blog.prepbytes.com\/wp-content\/uploads\/2025\/07\/uzxxllgloialmn9mhwfe.webp\",\"width\":160,\"height\":160,\"caption\":\"Prepbytes\"},\"image\":{\"@id\":\"http:\/\/43.205.93.38\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/prepbytes0211\/\",\"https:\/\/www.instagram.com\/prepbytes\/\",\"https:\/\/www.linkedin.com\/company\/prepbytes\/\",\"https:\/\/www.youtube.com\/channel\/UC0xGnHDrjUM1pDEK2Ka5imA\"]},{\"@type\":\"Person\",\"@id\":\"http:\/\/43.205.93.38\/#\/schema\/person\/3f7dc4ae851791d5947a7f99df363d5e\",\"name\":\"Prepbytes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"http:\/\/43.205.93.38\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/232042cd1a1ea0e982c96d2a2ec93fb70a8e864e00784491231e7bfe5a9e06b5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/232042cd1a1ea0e982c96d2a2ec93fb70a8e864e00784491231e7bfe5a9e06b5?s=96&d=mm&r=g\",\"caption\":\"Prepbytes\"},\"url\":\"https:\/\/prepbytes.com\/blog\/author\/gourav-jaincollegedekho-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Unix Interview Questions","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/prepbytes.com\/blog\/unix-interview-questions\/","og_locale":"en_US","og_type":"article","og_title":"Unix Interview Questions","og_description":"UNIX, an operating system with a rich history dating back to the 1960s, continues to be a fundamental part of the computing world. For job seekers in fields like system administration, software development, and DevOps, UNIX skills are highly sought after. To help you prepare for UNIX-related interviews, here are the top 25 UNIX interview [&hellip;]","og_url":"https:\/\/prepbytes.com\/blog\/unix-interview-questions\/","og_site_name":"PrepBytes Blog","article_publisher":"https:\/\/www.facebook.com\/prepbytes0211\/","article_published_time":"2023-10-31T11:29:06+00:00","author":"Prepbytes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Prepbytes","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/prepbytes.com\/blog\/unix-interview-questions\/#article","isPartOf":{"@id":"https:\/\/prepbytes.com\/blog\/unix-interview-questions\/"},"author":{"name":"Prepbytes","@id":"http:\/\/43.205.93.38\/#\/schema\/person\/3f7dc4ae851791d5947a7f99df363d5e"},"headline":"Unix Interview Questions","datePublished":"2023-10-31T11:29:06+00:00","mainEntityOfPage":{"@id":"https:\/\/prepbytes.com\/blog\/unix-interview-questions\/"},"wordCount":1414,"commentCount":0,"publisher":{"@id":"http:\/\/43.205.93.38\/#organization"},"articleSection":["Interview Questions"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/prepbytes.com\/blog\/unix-interview-questions\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/prepbytes.com\/blog\/unix-interview-questions\/","url":"https:\/\/prepbytes.com\/blog\/unix-interview-questions\/","name":"Unix Interview Questions","isPartOf":{"@id":"http:\/\/43.205.93.38\/#website"},"datePublished":"2023-10-31T11:29:06+00:00","breadcrumb":{"@id":"https:\/\/prepbytes.com\/blog\/unix-interview-questions\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/prepbytes.com\/blog\/unix-interview-questions\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/prepbytes.com\/blog\/unix-interview-questions\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"http:\/\/43.205.93.38\/"},{"@type":"ListItem","position":2,"name":"Interview Questions","item":"https:\/\/prepbytes.com\/blog\/category\/interview-questions\/"},{"@type":"ListItem","position":3,"name":"Unix Interview Questions"}]},{"@type":"WebSite","@id":"http:\/\/43.205.93.38\/#website","url":"http:\/\/43.205.93.38\/","name":"PrepBytes Blog","description":"ONE-STOP RESOURCE FOR EVERYTHING RELATED TO CODING","publisher":{"@id":"http:\/\/43.205.93.38\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"http:\/\/43.205.93.38\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"http:\/\/43.205.93.38\/#organization","name":"Prepbytes","url":"http:\/\/43.205.93.38\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"http:\/\/43.205.93.38\/#\/schema\/logo\/image\/","url":"https:\/\/blog.prepbytes.com\/wp-content\/uploads\/2025\/07\/uzxxllgloialmn9mhwfe.webp","contentUrl":"https:\/\/blog.prepbytes.com\/wp-content\/uploads\/2025\/07\/uzxxllgloialmn9mhwfe.webp","width":160,"height":160,"caption":"Prepbytes"},"image":{"@id":"http:\/\/43.205.93.38\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/prepbytes0211\/","https:\/\/www.instagram.com\/prepbytes\/","https:\/\/www.linkedin.com\/company\/prepbytes\/","https:\/\/www.youtube.com\/channel\/UC0xGnHDrjUM1pDEK2Ka5imA"]},{"@type":"Person","@id":"http:\/\/43.205.93.38\/#\/schema\/person\/3f7dc4ae851791d5947a7f99df363d5e","name":"Prepbytes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"http:\/\/43.205.93.38\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/232042cd1a1ea0e982c96d2a2ec93fb70a8e864e00784491231e7bfe5a9e06b5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/232042cd1a1ea0e982c96d2a2ec93fb70a8e864e00784491231e7bfe5a9e06b5?s=96&d=mm&r=g","caption":"Prepbytes"},"url":"https:\/\/prepbytes.com\/blog\/author\/gourav-jaincollegedekho-com\/"}]}},"_links":{"self":[{"href":"https:\/\/prepbytes.com\/blog\/wp-json\/wp\/v2\/posts\/18080","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/prepbytes.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/prepbytes.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/prepbytes.com\/blog\/wp-json\/wp\/v2\/users\/52"}],"replies":[{"embeddable":true,"href":"https:\/\/prepbytes.com\/blog\/wp-json\/wp\/v2\/comments?post=18080"}],"version-history":[{"count":2,"href":"https:\/\/prepbytes.com\/blog\/wp-json\/wp\/v2\/posts\/18080\/revisions"}],"predecessor-version":[{"id":18275,"href":"https:\/\/prepbytes.com\/blog\/wp-json\/wp\/v2\/posts\/18080\/revisions\/18275"}],"wp:attachment":[{"href":"https:\/\/prepbytes.com\/blog\/wp-json\/wp\/v2\/media?parent=18080"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/prepbytes.com\/blog\/wp-json\/wp\/v2\/categories?post=18080"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/prepbytes.com\/blog\/wp-json\/wp\/v2\/tags?post=18080"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}