Get ahead in your Class 10 Cyber Olympiad preparation with previous year question papers. These papers help students become familiar with the question pattern and assess their understanding of important computer concepts.
What's Inside the Paper?
MCQs based on topics like Operating System, Networking, HTML and much more.
Includes two sections: Computer & IT and Achiever's Section for challenging problems.
Answer key provided to support quick learning and revision.
Download the Class 10 Cyber Olympiad Previous Year Paper PDF to practise smarter and boost your chances of success in the exam.
It is the fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising oneself as a trustworthy entity in an electronic communication
b
Phishing
ii
It is an attempt to exploit a computer system or a private network inside a computer
c
Stalking
iii
This type of attack creates a situation in which a person or program successfully identifies as another by falsifying data, to gain an illegitimate advantage
d
Hacking
iv
It is unwanted and/or repeated surveillance by an individual or group toward another person
Q.2
Which SQL Query is used to remove a table and all its data from the database?
Q.3
Fill in the blanks:-
_________ is the process of recreating a design by analyzing a final product.
Q.4
In the context of green computing, what does virtualization help achieve?
Q.5
In CSS, how do you display a border with the following attribute values: The top border = 10 pixels The bottom border = 5 pixels The left border = 20 pixels The right border = 1 pixels
Q.6
Which method is used to move the file pointer to the beginning of the file?
Q.7
The HTML global attribute, "contenteditable" is used for which of the following purpose?
Q.8
What is the primary function of a mobile OS?
Q.9
Identify the type of processing with the help of the description given below:
(i) This type of processing is used for very large files or where a fast response time is not critical. The files to be transmitted are gathered over a period and then send together as a set. (ii) It is a technique of processing data that occur in one large group instead of individually. (iii) It is usually done to help conserve system resources and allow for any modifications before being processed. (iv) Examples of this type of processing include billing, report generation, data format conversion, and image processing.
Q.10
A tech company hires a freelance web developer through Upwork. This is an example of which model?
Answers to Previous Year Questions from CREST Olympiads:
Q.1
d
Q.2
c
Q.3
b
Q.4
a
Q.5
b
Q.6
b
Q.7
c
Q.8
d
Q.9
a
Q.10
c
Additional Preparation Resource
CREST Cyber Olympiad Worksheets Package for class 10 - It is a package of 5 worksheets. The worksheets are in the same pattern as the previous year paper. Hence, very useful for preparation. Existing users can purchase additional practice worksheets by following these steps: Login at https://www.crestolympiads.com/login -> Dashboard -> Additional Practice -> Buy & new users can visit https://www.crestolympiads.com/registration
Note: Don’t forget to download the CREST Cyber Olympiad past year paper pdf for class 10.
Answers to Previous Year Questions from CREST Olympiads:
Q.1 : d | Q.2 : c | Q.3 : b | Q.4 : a | Q.5 : b | Q.6 : b | Q.7 : c | Q.8 : d | Q.9 : a | Q.10 : c