Get ahead in your Class 10 Cyber Olympiad preparation with previous year question papers. These papers help students become familiar with the question pattern and assess their understanding of important computer concepts.
What's Inside the Paper?
MCQs based on topics like Operating System, Networking, HTML and much more.
Includes two sections: Computer & IT and Achiever's Section for challenging problems.
Answer key provided to support quick learning and revision.
Download the Class 10 Cyber Olympiad Previous Year Paper PDF to practise smarter and boost your chances of success in the exam.
What is the function of Big Data Analytics in online businesses?
Q.2
In CSS, how do you display a border with the following attribute values: The top border = 10 pixels The bottom border = 5 pixels The left border = 20 pixels The right border = 1 pixels
Q.3
Which of the following digital evidence types would most likely be used in a cyberbullying case?
Q.4
A tech company hires a freelance web developer through Upwork. This is an example of which model?
Q.5
HTML allow users to associate any number of external style sheets with a document. Users may specify a number of mutually exclusive style sheets with a document. What is the name of those sheets?
Q.6
Identify the type of processing with the help of the description given below:
(i) This type of processing is used for very large files or where a fast response time is not critical. The files to be transmitted are gathered over a period and then send together as a set. (ii) It is a technique of processing data that occur in one large group instead of individually. (iii) It is usually done to help conserve system resources and allow for any modifications before being processed. (iv) Examples of this type of processing include billing, report generation, data format conversion, and image processing.
Q.7
Match the following:
Column A
Column B
a
Spoofing
i
It is the fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising oneself as a trustworthy entity in an electronic communication
b
Phishing
ii
It is an attempt to exploit a computer system or a private network inside a computer
c
Stalking
iii
This type of attack creates a situation in which a person or program successfully identifies as another by falsifying data, to gain an illegitimate advantage
d
Hacking
iv
It is unwanted and/or repeated surveillance by an individual or group toward another person
Q.8
Fill in the blank:
To insert a new slide in the current presentation, we can choose _________.
Q.9
What is the result of `mylist = [4, 5, 6]; mylist.pop()`?
Q.10
Which of these is a security feature commonly used in web development to protect websites?
Answers to Previous Year Questions from CREST Olympiads:
Q.1
c
Q.2
b
Q.3
d
Q.4
c
Q.5
b
Q.6
a
Q.7
d
Q.8
a
Q.9
a
Q.10
b
Additional Preparation Resource
CREST Cyber Olympiad Worksheets Package for class 10 - It is a package of 5 worksheets. The worksheets are in the same pattern as the previous year paper. Hence, very useful for preparation. Existing users can purchase additional practice worksheets by following these steps: Login at https://www.crestolympiads.com/login -> Dashboard -> Additional Practice -> Buy & new users can visit https://www.crestolympiads.com/registration
Note: Don’t forget to download the CREST Cyber Olympiad past year paper pdf for class 10.
Answers to Previous Year Questions from CREST Olympiads:
Q.1 : c | Q.2 : b | Q.3 : d | Q.4 : c | Q.5 : b | Q.6 : a | Q.7 : d | Q.8 : a | Q.9 : a | Q.10 : b