Get ahead in your Class 10 Cyber Olympiad preparation with previous year question papers. These papers help students become familiar with the question pattern and assess their understanding of important computer concepts.
What's Inside the Paper?
MCQs based on topics like Operating System, Networking, HTML and much more.
Includes two sections: Computer & IT and Achiever's Section for challenging problems.
Answer key provided to support quick learning and revision.
Download the Class 10 Cyber Olympiad Previous Year Paper PDF to practise smarter and boost your chances of success in the exam.
What is the purpose of the NOT logical operator in a flowchart?
Q.2
Fill in the blank:
The information that we send through the Internet is broken into Packets by __________, Using the technique of Packet Switching.
Q.3
Which of the following statements are true?
Statement 1: Hyperlinks can point to any resource on the web, such as HTML page, an image, a sound file or a movie clip. Statement 2: The Anchor element uses various attributes such as Head, Name and Title. Statement 3: The text that is defined with NAME attribute will not get highlighted when displayed by the browser. Statement 4: If the linked document is located on the Internet, it is required to specify the absolute URL of the website. Statement 5: We cannot create a link to allow visitors to send us feedback in the form of an E-mail.
Q.4
Which of the following is/are the type of threats on the security of a computer system or network?
i. Interruption ii. Interception iii. Modification iv. Creation v. Fabrication
Q.5
Fill in the blank:
The analysis of _____ is a process of deconstruction that investigates the operations of texts, their constructions, the ways they produce meanings, what those meanings may be.
Q.6
What is the primary function of a mobile OS?
Q.7
Fill in the blank:
The use of dedicated Websites and applications to interact with other, or to find people with similar interests to one's own is termed as __________.
Q.8
Match the following:
Column A
Column B
a
Spoofing
i
It is the fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising oneself as a trustworthy entity in an electronic communication
b
Phishing
ii
It is an attempt to exploit a computer system or a private network inside a computer
c
Stalking
iii
This type of attack creates a situation in which a person or program successfully identifies as another by falsifying data, to gain an illegitimate advantage
d
Hacking
iv
It is unwanted and/or repeated surveillance by an individual or group toward another person
Q.9
Match the following type of Key in Column A with their description in Column B:
Column A
Column B
a
Primary Key
i
This key points to the primary key of another table
b
Composite Key
ii
This key uniquely identifies each record
c
Foreign Key
iii
It is a group of fields that uniquely defines the records
Q.10
When setting up a many-to-many relationship, which of these is a critical step?
Answers to Previous Year Questions from CREST Olympiads:
Q.1
a
Q.2
c
Q.3
c
Q.4
d
Q.5
c
Q.6
d
Q.7
d
Q.8
d
Q.9
d
Q.10
b
Additional Preparation Resource
CREST Cyber Olympiad Worksheets Package for class 10 - It is a package of 5 worksheets. The worksheets are in the same pattern as the previous year paper. Hence, very useful for preparation. Existing users can purchase additional practice worksheets by following these steps: Login at https://www.crestolympiads.com/login -> Dashboard -> Additional Practice -> Buy & new users can visit https://www.crestolympiads.com/registration
Note: Don’t forget to download the CREST Cyber Olympiad past year paper pdf for class 10.
Answers to Previous Year Questions from CREST Olympiads:
Q.1 : a | Q.2 : c | Q.3 : c | Q.4 : d | Q.5 : c | Q.6 : d | Q.7 : d | Q.8 : d | Q.9 : d | Q.10 : b