CREST Cyber Olympiad Class 10 Sample Paper

Prepare your child for the CREST Cyber Olympiad (CCO) with expertly crafted sample papers for Grade 10. These free PDF downloads, along with detailed solutions, are designed to help students grasp advanced cyber and computer science concepts and perform confidently in the exam.

Why Practise CREST Cyber Olympiad Sample Papers for Grade 10?

  • Gain a thorough understanding of the exam format and question types.
  • Sharpen problem-solving skills and improve time management.
  • Identify weak areas and focus on strategic revision for better results.

Download Grade 10 CREST Cyber Olympiad Sample Paper (PDF)

Get the free Grade 10 CREST Cyber Olympiad sample paper in PDF format to boost your child's preparation and increase their chances of scoring high in the Olympiad.

>> Join CREST Olympiads WhatsApp Channel for latest updates. Sample PDF of CREST Cyber Olympiad for Class 10:


If your web browser doesn't have a PDF Plugin. Instead you can Click here to download the PDF

Syllabus:

Section 1: Computer & IT

  1. Advanced Networking & Internet Concepts
    • Ports and Protocols – e.g., port 80 for HTTP, port 443 for HTTPS
    • Public vs Private IP addresses (IPv4 basics)
    • Static vs Dynamic IP allocation (DHCP)
    • Web hosting basics – Domain, web server, hosting providers, uptime
    • Packet switching, Packet loss, Routers, Throughput
  2. Algorithms and Flowcharts
    • Algorithm Design: nested conditions, designing modular algorithms using sub-processes
    • Flowchart Techniques: loops, nested conditions (if-else, switch)
    • Iteration: using loops in algorithms (for, while)
    • Problem-Solving Activities (Algorithms): LCM & GCD, palindrome check, count vowels
    • Problem-Solving Activities (Flowcharts): simulate calculator, sort array
    • Integration with Programming Languages: convert flowcharts into working code
    • Logical Operators in Conditions (AND, OR, NOT)
  3. Computer Fundamentals
    • Operating System
    • Number System
    • User Interface
    • Memory
    • Task Management
  4. Cybersecurity and Digital Forensics
    • Digital Forensics: investigating computers, mobile phones, networks to uncover evidence
    • Digital Evidence: deleted files, emails, messages, browser history, photos/videos, network/server logs
    • Types of Digital Forensics: computer, mobile, network, cloud, memory forensics
    • Process of Digital Forensics: identification, preservation, analysis, reporting, presentation
    • Relationship Between Cybersecurity and Digital Forensics
  5. Data Management and E-commerce
    • Key Components of Data Management: collection, storage, organization, quality, security, analytics
    • Types of E-Commerce Models: B2C, B2B, C2C, C2B
    • Key Features of E-Commerce: online stores, payment systems, shopping cart, reviews, order management
    • Challenges of Data Management: privacy, security, data overload, integration, accuracy
    • Technologies Supporting Data Management: Cloud Computing, Big Data, Machine Learning & AI, DBMS
  6. Latest Developments in the Field of IT
    • Machine Learning (ML) – difference from AI, usage in prediction and personalisation
    • Green Computing – energy-efficient devices, e-waste reduction
  7. MS Office
    • MS Word
    • MS PowerPoint
    • MS Excel
    • MS Access
  8. Python Programming (Text-Based Coding)
    • Use of Python Modules: math, random, datetime, statistics
    • Data Validation and Error Handling
    • List & Dictionary: nested lists, list comprehensions, dictionary methods (update(), pop(), items(), etc.)
    • Functions: default and keyword arguments, return vs print, lambda functions
    • File Handling – text files: read, write, append, using with, line-by-line reading, writing logs/reports
  9. Web Development
    • Types: front-end (client-side), back-end (server-side), full-stack development
    • Web Design
    • Web Hosting & Deployment
    • Web Development Tools
    • Web Security
    • Web Performance Optimization
  10. Working with Databases using MS Access / DBMS
    • Querying: set conditions using relational/logical operators, multiple conditions
    • Working with Multiple Databases: relationships (1-1, 1-many, many-1, many-many)
    • Object Linking & Embedding: linking vs embedding, inserting/linking external objects

Section 2: Achievers Section

  • Higher Order Thinking Questions – Syllabus as per Section 1.
  • Questions are based on Windows 11 and MS Office 2016.

Sample Questions

Q.1 Q.2 Q.3 Q.4 Q.5 Q.6 Q.7 Q.8 Q.9 Q.10

Q.1

Fill in the blanks in context to DBMS:

(i) A database stores and processes data in the form of ___________.
(ii) A primary key should never contain ____________ values.

Q.2

What device separates a single network into two segments but lets the two segments appear as one to higher protocols?

Q.3

Which of the following is not a type of relationship that can be applied in the MS Access database?

Q.4

Fill in the blanks in context to HTML:

(i) The __________ list is used when the list items are not to be displayed in any particular order.
(ii) The three values that can be defined with ___________ tag are disc, square and circle.
(iii) The __________ tag is used to display the list of items in a specific order.
(iv) To specify the starting point of the numbering scheme __________ attribute is used.
(v) If one set of elements is embedded within another set, it is called __________ list.

Q.5

Which of the following database language allows you to access or maintain data in a database?

Q.6

Fill in the blanks:

A __________ is a PC or workstation that sends a request for any information or service to the ____________.

Q.7

Which tag inserts a line horizontally on your web page?

Q.8

Match the following:

 

Column A

 

Column B

1.      

Community cloud

a.      

The software that manages this cloud responds to cloud bursts by provisioning extra resources from the public cloud as required.

2.      

Private cloud

b.      

This cloud is a truly shared facility that allows multiple clients to use the resources provided. It is the closest to the definition of a cloud infrastructure.

3.      

Public cloud

c.       

It is a shared computing infrastructure that is used by a specified community of users that have common needs in terms of specifications.

4.      

Hybrid cloud

d.      

Only one organisation uses this cloud and normally the physical server racks are also present on the organisation’s premises.

Q.9

The image below displays a common MS PowerPoint SmartArt. Identify which of the following categories of Smart Art does this fall under.



Q.10

Which protocol is used for a reliable and fool-proof data transmission over the network?

Your Score: 0/10

Answers to Sample Questions from CREST Olympiads:

Q.1cQ.2bQ.3dQ.4dQ.5bQ.6cQ.7cQ.8aQ.9aQ.10c

Answers to Sample Questions from CREST Olympiads:

Q.1 : c | Q.2 : b | Q.3 : d | Q.4 : d | Q.5 : b | Q.6 : c | Q.7 : c | Q.8 : a | Q.9 : a | Q.10 : c

70%