CREST Cyber Olympiad Class 10 Sample Paper

Prepare your child for the CREST Cyber Olympiad (CCO) with expertly crafted sample papers for Grade 10. These free PDF downloads, along with detailed solutions, are designed to help students grasp advanced cyber and computer science concepts and perform confidently in the exam.

Why Practise CREST Cyber Olympiad Sample Papers for Grade 10?

  • Gain a thorough understanding of the exam format and question types.
  • Sharpen problem-solving skills and improve time management.
  • Identify weak areas and focus on strategic revision for better results.

Download Grade 10 CREST Cyber Olympiad Sample Paper (PDF)

Get the free Grade 10 CREST Cyber Olympiad sample paper in PDF format to boost your child's preparation and increase their chances of scoring high in the Olympiad.

>> Join CREST Olympiads WhatsApp Channel for latest updates. Sample PDF of CREST Cyber Olympiad for Class 10:


If your web browser doesn't have a PDF Plugin. Instead you can Click here to download the PDF

Syllabus:

Section 1: Computer & IT

  1. Advanced Networking & Internet Concepts
    • Ports and Protocols – e.g., port 80 for HTTP, port 443 for HTTPS
    • Public vs Private IP addresses (IPv4 basics)
    • Static vs Dynamic IP allocation (DHCP)
    • Web hosting basics – Domain, web server, hosting providers, uptime
    • Packet switching, Packet loss, Routers, Throughput
  2. Algorithms and Flowcharts
    • Algorithm Design: nested conditions, designing modular algorithms using sub-processes
    • Flowchart Techniques: loops, nested conditions (if-else, switch)
    • Iteration: using loops in algorithms (for, while)
    • Problem-Solving Activities (Algorithms): LCM & GCD, palindrome check, count vowels
    • Problem-Solving Activities (Flowcharts): simulate calculator, sort array
    • Integration with Programming Languages: convert flowcharts into working code
    • Logical Operators in Conditions (AND, OR, NOT)
  3. Computer Fundamentals
    • Operating System
    • Number System
    • User Interface
    • Memory
    • Task Management
  4. Cybersecurity and Digital Forensics
    • Digital Forensics: investigating computers, mobile phones, networks to uncover evidence
    • Digital Evidence: deleted files, emails, messages, browser history, photos/videos, network/server logs
    • Types of Digital Forensics: computer, mobile, network, cloud, memory forensics
    • Process of Digital Forensics: identification, preservation, analysis, reporting, presentation
    • Relationship Between Cybersecurity and Digital Forensics
  5. Data Management and E-commerce
    • Key Components of Data Management: collection, storage, organization, quality, security, analytics
    • Types of E-Commerce Models: B2C, B2B, C2C, C2B
    • Key Features of E-Commerce: online stores, payment systems, shopping cart, reviews, order management
    • Challenges of Data Management: privacy, security, data overload, integration, accuracy
    • Technologies Supporting Data Management: Cloud Computing, Big Data, Machine Learning & AI, DBMS
  6. Latest Developments in the Field of IT
    • Machine Learning (ML) – difference from AI, usage in prediction and personalisation
    • Green Computing – energy-efficient devices, e-waste reduction
  7. MS Office
    • MS Word
    • MS PowerPoint
    • MS Excel
    • MS Access
  8. Python Programming (Text-Based Coding)
    • Use of Python Modules: math, random, datetime, statistics
    • Data Validation and Error Handling
    • List & Dictionary: nested lists, list comprehensions, dictionary methods (update(), pop(), items(), etc.)
    • Functions: default and keyword arguments, return vs print, lambda functions
    • File Handling – text files: read, write, append, using with, line-by-line reading, writing logs/reports
  9. Web Development
    • Types: front-end (client-side), back-end (server-side), full-stack development
    • Web Design
    • Web Hosting & Deployment
    • Web Development Tools
    • Web Security
    • Web Performance Optimization
  10. Working with Databases using MS Access / DBMS
    • Querying: set conditions using relational/logical operators, multiple conditions
    • Working with Multiple Databases: relationships (1-1, 1-many, many-1, many-many)
    • Object Linking & Embedding: linking vs embedding, inserting/linking external objects

Section 2: Achievers Section

  • Higher Order Thinking Questions – Syllabus as per Section 1.
  • Questions are based on Windows 11 and MS Office 2016.

Sample Questions

Q.1 Q.2 Q.3 Q.4 Q.5 Q.6 Q.7 Q.8 Q.9 Q.10

Q.1

What does full-stack development involve?

Q.2

Which of the following is not a type of basic model available in E-governance?

Q.3

Which of the following is the correct HTML tag to left-align the content inside a table cell?

Q.4

Which of the following is most critical in preventing unauthorised access to personal data in an organisation?

Q.5

Fill in the blanks in context to HTML:

(i) The __________ list is used when the list items are not to be displayed in any particular order.
(ii) The three values that can be defined with ___________ tag are disc, square and circle.
(iii) The __________ tag is used to display the list of items in a specific order.
(iv) To specify the starting point of the numbering scheme __________ attribute is used.
(v) If one set of elements is embedded within another set, it is called __________ list.

Q.6

What is the purpose of random.randint()?

Q.7

How does a for loop differ from a while loop in algorithms?

Q.8

What is the result of `mylist = [4, 5, 8]; mylist.pop()`?

Q.9

In an OLE (Object Linking and Embedding) scenario, what is a disadvantage of linking external objects?

Q.10

In data organisation, what is the role of database tables and fields?

Your Score: 0/10

Answers to Sample Questions from CREST Olympiads:

Q.1cQ.2cQ.3cQ.4cQ.5dQ.6dQ.7aQ.8bQ.9cQ.10b

Answers to Sample Questions from CREST Olympiads:

Q.1 : c | Q.2 : c | Q.3 : c | Q.4 : c | Q.5 : d | Q.6 : d | Q.7 : a | Q.8 : b | Q.9 : c | Q.10 : b

70%