CREST Cyber Olympiad Class 10 Sample Paper

Prepare your child for the CREST Cyber Olympiad (CCO) with expertly crafted sample papers for Grade 10. These free PDF downloads, along with detailed solutions, are designed to help students grasp advanced cyber and computer science concepts and perform confidently in the exam.

Why Practise CREST Cyber Olympiad Sample Papers for Grade 10?

  • Gain a thorough understanding of the exam format and question types.
  • Sharpen problem-solving skills and improve time management.
  • Identify weak areas and focus on strategic revision for better results.

Download Grade 10 CREST Cyber Olympiad Sample Paper (PDF)

Get the free Grade 10 CREST Cyber Olympiad sample paper in PDF format to boost your child's preparation and increase their chances of scoring high in the Olympiad.

>> Join CREST Olympiads WhatsApp Channel for latest updates. Sample PDF of CREST Cyber Olympiad for Class 10:


If your web browser doesn't have a PDF Plugin. Instead you can Click here to download the PDF

Syllabus:

Section 1: Computer & IT

  1. Advanced Networking & Internet Concepts
    • Ports and Protocols – e.g., port 80 for HTTP, port 443 for HTTPS
    • Public vs Private IP addresses (IPv4 basics)
    • Static vs Dynamic IP allocation (DHCP)
    • Web hosting basics – Domain, web server, hosting providers, uptime
    • Packet switching, Packet loss, Routers, Throughput
  2. Algorithms and Flowcharts
    • Algorithm Design: nested conditions, designing modular algorithms using sub-processes
    • Flowchart Techniques: loops, nested conditions (if-else, switch)
    • Iteration: using loops in algorithms (for, while)
    • Problem-Solving Activities (Algorithms): LCM & GCD, palindrome check, count vowels
    • Problem-Solving Activities (Flowcharts): simulate calculator, sort array
    • Integration with Programming Languages: convert flowcharts into working code
    • Logical Operators in Conditions (AND, OR, NOT)
  3. Computer Fundamentals
    • Operating System
    • Number System
    • User Interface
    • Memory
    • Task Management
  4. Cybersecurity and Digital Forensics
    • Digital Forensics: investigating computers, mobile phones, networks to uncover evidence
    • Digital Evidence: deleted files, emails, messages, browser history, photos/videos, network/server logs
    • Types of Digital Forensics: computer, mobile, network, cloud, memory forensics
    • Process of Digital Forensics: identification, preservation, analysis, reporting, presentation
    • Relationship Between Cybersecurity and Digital Forensics
  5. Data Management and E-commerce
    • Key Components of Data Management: collection, storage, organization, quality, security, analytics
    • Types of E-Commerce Models: B2C, B2B, C2C, C2B
    • Key Features of E-Commerce: online stores, payment systems, shopping cart, reviews, order management
    • Challenges of Data Management: privacy, security, data overload, integration, accuracy
    • Technologies Supporting Data Management: Cloud Computing, Big Data, Machine Learning & AI, DBMS
  6. Latest Developments in the Field of IT
    • Machine Learning (ML) – difference from AI, usage in prediction and personalisation
    • Green Computing – energy-efficient devices, e-waste reduction
  7. MS Office
    • MS Word
    • MS PowerPoint
    • MS Excel
    • MS Access
  8. Python Programming (Text-Based Coding)
    • Use of Python Modules: math, random, datetime, statistics
    • Data Validation and Error Handling
    • List & Dictionary: nested lists, list comprehensions, dictionary methods (update(), pop(), items(), etc.)
    • Functions: default and keyword arguments, return vs print, lambda functions
    • File Handling – text files: read, write, append, using with, line-by-line reading, writing logs/reports
  9. Web Development
    • Types: front-end (client-side), back-end (server-side), full-stack development
    • Web Design
    • Web Hosting & Deployment
    • Web Development Tools
    • Web Security
    • Web Performance Optimization
  10. Working with Databases using MS Access / DBMS
    • Querying: set conditions using relational/logical operators, multiple conditions
    • Working with Multiple Databases: relationships (1-1, 1-many, many-1, many-many)
    • Object Linking & Embedding: linking vs embedding, inserting/linking external objects

Section 2: Achievers Section

  • Higher Order Thinking Questions – Syllabus as per Section 1.
  • Questions are based on Windows 11 and MS Office 2016.

Sample Questions

Q.1 Q.2 Q.3 Q.4 Q.5 Q.6 Q.7 Q.8 Q.9 Q.10

Q.1

What is the purpose of statistics.median()?

Q.2

In Microsoft Excel, which function would you use to find the average of a range of cells, say from A1 to A10?

Q.3

Which of the following is most critical in preventing unauthorised access to personal data in an organisation?

Q.4

Which attribute of the <A> tag takes the URL of the linked file?

Q.5

Fill in the blanks:

With _______ only one process can execute at a time; meanwhile all other process are waiting for the processor. With _______ more than one process can be running simultaneously each on a different processor.

Q.6

Fill in the blanks in context to DBMS:

(i) A database stores and processes data in the form of ___________.
(ii) A primary key should never contain ____________ values.

Q.7

What device separates a single network into two segments but lets the two segments appear as one to higher protocols?

Q.8

Which command will take you to the first slide of your presentation in MS PowerPoint?

Q.9

What is web performance optimization?

Q.10

What type of digital evidence would forensic investigators look for when investigating a data breach in an organization?

Your Score: 0/10

Answers to Sample Questions from CREST Olympiads:

Q.1aQ.2aQ.3cQ.4aQ.5dQ.6cQ.7bQ.8bQ.9dQ.10b

Answers to Sample Questions from CREST Olympiads:

Q.1 : a | Q.2 : a | Q.3 : c | Q.4 : a | Q.5 : d | Q.6 : c | Q.7 : b | Q.8 : b | Q.9 : d | Q.10 : b

70%