lesson 13


Health, Safety and Security at Workplace

    đŸ‘‰Text Books PDF
    đŸ‘‰MCQ Online Exam
    đŸ‘‰MCQ Answer
    đŸ‘‰Paid Answer (For Membership User)


1.  What is workplace safety? (āĻ•āϰ্āĻŽāĻ•্āώেāϤ্ā§°ā§° āϏুā§°āĻ•্āώা āĻ•ি?)
Answer: Workplace safety refers to the measures taken to protect employees from accidents, injuries, and health hazards in the workplace.
(āĻ•āϰ্āĻŽāĻ•্āώেāϤ্ā§°ā§° āϏুā§°āĻ•্āώা āĻšৈāĻ›ে āĻāύে āĻŦ্āĻ¯ā§ąāϏ্āĻĨা, āϝিāϝ়ে āϕ⧰্āĻŽāϚাā§°ীāĻ• āĻĻুā§°্āϘāϟāύা, āφāϘাāϤ āφ⧰ু āϏ্āĻŦাāϏ্āĻĨ্āϝāϜāύিāϤ āϏāĻŽāϏ্āϝাā§° āĻĒā§°া ā§°āĻ•্āώা āϕ⧰ে।)

2. What are the different types of workplace hazards? (āĻ•āϰ্āĻŽāĻ•্āώেāϤ্ā§°āϤ āĻŦিāĻĒāĻĻā§° āĻŦিāĻ­িāύ্āύ āϧ⧰āĻŖ āĻ•ি?)
Answer: The different types of workplace hazards are:
Physical Hazards (āĻļাā§°ীā§°িāĻ• āĻŦিāĻĒāĻĻ) – Fire, electric shocks, machine injuries.
Chemical Hazards (ā§°াāϏাāϝ়āύিāĻ• āĻŦিāĻĒāĻĻ) – Harmful gases, toxic substances.
Biological Hazards (āϜৈā§ąিāĻ• āĻŦিāĻĒāĻĻ) – Viruses, bacteria, infections.
Ergonomic Hazards (āĻļā§°ীā§°ā§° āĻ­াā§ąā§° āĻŦাāĻŦে āĻŦিāĻĒāĻĻ) – Poor sitting posture, repetitive strain injuries.

3. What is ergonomics? (Ergonomics āĻ•ি?)
Answer: Ergonomics is the study of designing a workplace that is comfortable, efficient, and safe for employees.
(Ergonomics āĻšāϞ āĻ•āϰ্āĻŽāĻ•্āώেāϤ্ā§°āϟোāĻ• āϏুāĻŦিāϧাāϜāύāĻ•, āĻ•াāϰ্āϝāĻ•্āώāĻŽ āφ⧰ু āϏুā§°āĻ•্āώিāϤ āϕ⧰িāĻŦāϞৈ āϕ⧰া āĻ—ā§ąেāώāĻŖা।)

4. What are the benefits of good ergonomics at the workplace? (āĻ•āϰ্āĻŽāĻ•্āώেāϤ্ā§°āϤ āĻ­াāϞ Ergonomics-ā§° āϏুāĻŦিāϧা āĻ•ি?)
Answer:
Reduces physical strain (āĻļাā§°ীā§°িāĻ• āĻ•্āϞাāύ্āϤি āĻ•āĻŽা⧟)
Prevents injuries (āφāϘাāϤ ā§°োāϧ āϕ⧰ে)
Increases productivity (āĻ•াā§°্āϝāĻ•্āώāĻŽāϤা āĻŦৃāĻĻ্āϧি āϕ⧰ে)
Improves employee comfort (āĻ•āϰ্āĻŽāϚাā§°ীā§° āϏ্āĻŦাāϚ্āĻ›āύ্āĻĻ āĻŦৃāĻĻ্āϧি āϕ⧰ে)

5. What are the fire safety measures at the workplace? (āĻ•āϰ্āĻŽāĻ•্āώেāϤ্ā§°āϤ āϜুāχ⧰ āĻĒā§°া āϏুā§°āĻ•্āώাā§° āĻŦ্āĻ¯ā§ąāϏ্āĻĨা āĻ•ি?)
Answer:
Install fire extinguishers (āϜুāχ āύিā§°্āĻŦাāĻĒāĻ• āĻŦ্āĻ¯ā§ąāϏ্āĻĨা āϏ্āĻĨাāĻĒāύ āϕ⧰া)
Conduct fire drills (āϜ⧰ুā§°ীāĻ•াāϞীāύ āĻ…āĻ­্āϝাāϏ āϕ⧰া)
Keep emergency exits clear (āϜ⧰ুā§°ী āĻŦাāĻšিā§°ā§° āĻĒāĻĨ āĻ–াāϞি ā§°াāĻ–া)
Use fire-resistant materials (āϜুāχ āĻĒ্ā§°āϤিā§°োāϧী āĻŦāϏ্āϤু āĻŦ্āĻ¯ā§ąāĻšাā§° āϕ⧰া)

6. What is first aid? (āĻĒ্ā§°াāĻĨāĻŽিāĻ• āϚিāĻ•িā§ŽāϏা āĻ•ি?)
Answer: First aid is the immediate medical help given to an injured person before professional medical treatment is available.
(āĻĒ্ā§°াāĻĨāĻŽিāĻ• āϚিāĻ•িā§ŽāϏা āĻšৈāĻ›ে āφāϘাāϤāĻĒ্ā§°াāĻĒ্āϤ āĻŦ্āϝāĻ•্āϤিāĻ• āϚিāĻ•িā§ŽāϏাāϞ⧟āϞৈ āύি āϚিāĻ•িā§ŽāϏা āĻĻি⧟াā§° āφāĻ—āϤেāχ āĻĻি⧟া āĻĒ্ā§°াāĻĨāĻŽিāĻ• āϏāĻšা⧟।)

7. What are the basic first aid measures at the workplace? (āĻ•āϰ্āĻŽāĻ•্āώেāϤ্ā§°āϤ āĻĒ্ā§°াāĻĨāĻŽিāĻ• āϚিāĻ•িā§ŽāϏাā§° āĻŦ্āĻ¯ā§ąāϏ্āĻĨা āĻ•ি?)
Answer:
Cleaning and dressing wounds
(āφāϘাāϤ āϧুāχ āĻŦ্āϝাāĻŖ্āĻĄেāϜ āϞāĻ—োā§ąা)
Using CPR for unconscious persons (āĻ…āϚেāϤāύ āĻŦ্āϝāĻ•্āϤিāĻ• CPR āĻĻি⧟া)
Applying ice packs for swelling (āĻĢুāϞাāχ āϝোā§ąা āϏ্āĻĨাāύāϤ āĻŦā§°āĻĢ āϞāĻ—োā§ąা)
Keeping a first aid box (āĻĒ্ā§°াāĻĨāĻŽিāĻ• āϚিāĻ•িā§ŽāϏাā§° āĻŦাāĻ•āϚ ā§°াāĻ–া)

8. What is cyber security? (āϏাāχāĻŦাā§° āϏুā§°āĻ•্āώা āĻ•ি?)
Answer: Cyber security refers to protecting computers, networks, and data from unauthorized access, cyber threats, and hacking.
(āϏাāχāĻŦাā§° āϏুā§°āĻ•্āώা āĻšৈāĻ›ে āĻ•āĻŽ্āĻĒিāωāϟাā§°, āύেāĻŸā§ąā§°্āĻ• āφ⧰ু āĻĄাāϟাāĻ• āĻ…āύুāĻŽāϤি āύāĻĨāĻ•া āĻŦ্āϝāĻ•্āϤিā§° āĻĒā§°া ā§°āĻ•্āώা āϕ⧰া।)

9. What are common cyber threats? (āϏাāϧাā§°āĻŖ āϏাāχāĻŦাā§° āĻŦিāĻĒāĻĻāϏāĻŽূāĻš āĻ•ি?)
Answer:
Phishing (āĻĒ্ā§°āϤাā§°āĻŖাāĻŽূāϞāĻ• āχ-āĻŽেāχāϞ)
Malware (āĻ­াāχ⧰াāĻ›, āϏ্āĻĒাāĻ‡ā§ąেā§°, ā§°েāύāĻ›āĻŽā§ąেā§°)
Hacking (āĻ…āύুāĻŽāϤি āύāĻĨāĻ•া āĻŦ্āϝāĻ•্āϤিā§° āĻ…āύুāĻĒ্ā§°ā§ąেāĻļ)
Data breaches (āĻĄাāϟা āϚুā§°ি āĻŦা āĻĢাāĻĻিāϞ)

10. What are strong password guidelines? (āĻļāĻ•্āϤিāĻļাāϞী āĻĒাāĻ›ā§ąā§°্āĻĄā§° āύি⧟āĻŽ āĻ•ি?)
Answer:
Use at least 8-12 characters
(ā§Ž-⧧⧍ āĻ…āĻ•্āώ⧰⧰ āĻĒাāĻ›ā§ąā§°্āĻĄ āĻŦ্āĻ¯ā§ąāĻšাā§° āϕ⧰া)
Include uppercase, lowercase, numbers, and symbols (āĻĄাāϙ⧰-āϏ⧰ু āφāĻ–ā§°, āϏংāĻ–্āϝা, āφ⧰ু āĻŦিāĻļেāώ āϚিāĻš্āύ āĻŦ্āĻ¯ā§ąāĻšাā§° āϕ⧰া)
Do not use personal information (āĻŦ্āϝāĻ•্āϤিāĻ—āϤ āϤāĻĨ্āϝ āĻŦ্āĻ¯ā§ąāĻšাā§° āύāϕ⧰া)
Change passwords regularly (āĻĒাāĻ›ā§ąā§°্āĻĄ āϏāĻŽā§Ÿ āϏāĻŽā§ŸāϤ āϏāϞāύি āϕ⧰া)

11. What is phishing? (Phishing āĻ•ি?)
Answer: Phishing is a cyber-attack where attackers trick people into revealing personal information like passwords and bank details through fake emails or websites.
(Phishing āĻšৈāĻ›ে āĻāĻ• āϏাāχāĻŦাā§° āφāĻ•্ā§°āĻŽāĻŖ, āϝ’āϤ āĻĒ্ā§°āϤাā§°āϕ⧰ āĻĻ্āĻŦাā§°া āĻ­ুāϞāĻ­াāϞ āχ-āĻŽেāχāϞ āĻŦা ā§ąেāĻŦāĻ›াāχāϟ⧰ āĻŽাāϧ্āϝāĻŽেā§°ে āĻŦ্āϝāĻ•্āϤিāĻ—āϤ āϤāĻĨ্āϝ āϚুā§°ি āϕ⧰া āĻšā§Ÿ।)

12. What are the methods to secure data at the workplace? (āĻ•āϰ্āĻŽāĻ•্āώেāϤ্ā§°āϤ āĻĄাāϟা āϏুā§°āĻ•্āώিāϤ ā§°āĻ–াā§° āωāĻĒা⧟ āĻ•ি?)
Answer:
Using strong passwords (āĻļāĻ•্āϤিāĻļাāϞী āĻĒাāĻ›ā§ąā§°্āĻĄ āĻŦ্āĻ¯ā§ąāĻšাā§°)
Encrypting sensitive data (āĻ—ুāĻĒ্āϤ āϏংāĻ•েāϤ āĻĒ্⧰⧟োāĻ—)
Taking regular backups (āϏāĻĻা⧟ āĻĄাāϟা āĻŦ্āϝাāĻ•āφāĻĒ āϞোā§ąা)
Restricting unauthorized access (āĻ…āύুāĻŽāϤি āύāĻĨāĻ•া āĻŦ্āϝāĻ•্āϤিāĻ• āĻĄাāϟা āĻĒ্ā§°ā§ąেāĻļ āύাāĻĨāĻ•িāĻŦ āĻĻি⧟া)

13. What are the emergency safety measures at the workplace? (āĻ•āϰ্āĻŽāĻ•্āώেāϤ্ā§°āϤ āϜ⧰ুā§°ীāĻ•াāϞীāύ āϏুā§°āĻ•্āώা āĻŦ্āĻ¯ā§ąāϏ্āĻĨা āĻ•ি?)
Answer:
Install emergency alarms (āϜ⧰ুā§°ী āϏংāĻ•েāϤ āĻŦ্āĻ¯ā§ąāϏ্āĻĨা āϏ্āĻĨাāĻĒāύ āϕ⧰া)
Train employees for emergency situations (āĻ•āϰ্āĻŽāϚাā§°ীāĻ• āĻĒ্ā§°āĻļিāĻ•্āώāĻŖ āĻĻি⧟া)
Keep emergency exits accessible (āϜ⧰ুā§°ী āĻŦাāĻšিā§°ā§° āĻĒāĻĨ āĻ–ুāϞি ā§°াāĻ–া)
Maintain first aid kits (āĻĒ্ā§°াāĻĨāĻŽিāĻ• āϚিāĻ•িā§ŽāϏাā§° āĻŦাāĻ•āϚ āωāĻĒāϞāĻŦ্āϧ ā§°াāĻ–া)

14. Why is data backup important? (āĻĄাāϟা āĻŦ্āϝাāĻ•āφāĻĒ āĻ•েāύেāĻ•ৈ āĻ—ুā§°ুāϤ্āĻŦāĻĒূā§°্āĻŖ?)
Answer: Data backup is important because it helps recover lost or corrupted data in case of system failure, cyber-attacks, or accidental deletion.
(āĻĄাāϟা āĻŦ্āϝাāĻ•āφāĻĒ āĻĒ্⧰⧟োāϜāύী⧟, āĻ•ি⧟āύো āχ āĻ•āĻŽ্āĻĒিāωāϟাā§° āϤ্ā§°ুāϟি, āϏাāχāĻŦাā§° āφāĻ•্ā§°āĻŽāĻŖ, āĻŦা āĻĄাāϟা āĻ—া⧟েāĻŦ āĻš’āϞে āĻĒুāύ⧰ুāĻĻ্āϧাā§° āϕ⧰াāϤ āϏāĻšা⧟ āϕ⧰ে।)

15. What is two-factor authentication (2FA)? (Two-Factor Authentication (2FA) āĻ•ি?)
Answer: Two-factor authentication (2FA) is an extra security layer where users must verify their identity using two methods, such as a password and a one-time code sent to their phone.
(2FA āĻšৈāĻ›ে āϏুā§°āĻ•্āώাā§° āĻāϟা āĻ…āϤিā§°িāĻ•্āϤ āϏ্āϤ⧰, āϝ’āϤ āĻŦ্āĻ¯ā§ąāĻšাā§°āĻ•াā§°ীāĻ• āĻĒাāĻ›ā§ąā§°্āĻĄā§° āωāĻĒā§°ি āĻĢোāύāϤ āĻĒāĻ োā§ąা OTP āĻŦা āφāύ āĻ•োāύো āĻĒ্ā§°āĻŽাāĻŖā§° āĻŽাāϧ্āϝāĻŽেā§°ে āϚিāύাāĻ•্āϤ āϕ⧰া āĻšā§Ÿ।)




EDIT BY : KRISHNA SAIKIA