CREST Cyber Olympiad Class 10 Sample Paper

Prepare your child for the CREST Cyber Olympiad (CCO) with expertly crafted sample papers for Grade 10. These free PDF downloads, along with detailed solutions, are designed to help students grasp advanced cyber and computer science concepts and perform confidently in the exam.

Why Practise CREST Cyber Olympiad Sample Papers for Grade 10?

  • Gain a thorough understanding of the exam format and question types.
  • Sharpen problem-solving skills and improve time management.
  • Identify weak areas and focus on strategic revision for better results.

Download Grade 10 CREST Cyber Olympiad Sample Paper (PDF)

Get the free Grade 10 CREST Cyber Olympiad sample paper in PDF format to boost your child's preparation and increase their chances of scoring high in the Olympiad.

>> Join CREST Olympiads WhatsApp Channel for latest updates. Sample PDF of CREST Cyber Olympiad for Class 10:


If your web browser doesn't have a PDF Plugin. Instead you can Click here to download the PDF

Syllabus:

Section 1: Computer & IT

  1. Advanced Networking & Internet Concepts
    • Ports and Protocols – e.g., port 80 for HTTP, port 443 for HTTPS
    • Public vs Private IP addresses (IPv4 basics)
    • Static vs Dynamic IP allocation (DHCP)
    • Web hosting basics – Domain, web server, hosting providers, uptime
    • Packet switching, Packet loss, Routers, Throughput
  2. Algorithms and Flowcharts
    • Algorithm Design: nested conditions, designing modular algorithms using sub-processes
    • Flowchart Techniques: loops, nested conditions (if-else, switch)
    • Iteration: using loops in algorithms (for, while)
    • Problem-Solving Activities (Algorithms): LCM & GCD, palindrome check, count vowels
    • Problem-Solving Activities (Flowcharts): simulate calculator, sort array
    • Integration with Programming Languages: convert flowcharts into working code
    • Logical Operators in Conditions (AND, OR, NOT)
  3. Computer Fundamentals
    • Operating System
    • Number System
    • User Interface
    • Memory
    • Task Management
  4. Cybersecurity and Digital Forensics
    • Digital Forensics: investigating computers, mobile phones, networks to uncover evidence
    • Digital Evidence: deleted files, emails, messages, browser history, photos/videos, network/server logs
    • Types of Digital Forensics: computer, mobile, network, cloud, memory forensics
    • Process of Digital Forensics: identification, preservation, analysis, reporting, presentation
    • Relationship Between Cybersecurity and Digital Forensics
  5. Data Management and E-commerce
    • Key Components of Data Management: collection, storage, organization, quality, security, analytics
    • Types of E-Commerce Models: B2C, B2B, C2C, C2B
    • Key Features of E-Commerce: online stores, payment systems, shopping cart, reviews, order management
    • Challenges of Data Management: privacy, security, data overload, integration, accuracy
    • Technologies Supporting Data Management: Cloud Computing, Big Data, Machine Learning & AI, DBMS
  6. Latest Developments in the Field of IT
    • Machine Learning (ML) – difference from AI, usage in prediction and personalisation
    • Green Computing – energy-efficient devices, e-waste reduction
  7. MS Office
    • MS Word
    • MS PowerPoint
    • MS Excel
    • MS Access
  8. Python Programming (Text-Based Coding)
    • Use of Python Modules: math, random, datetime, statistics
    • Data Validation and Error Handling
    • List & Dictionary: nested lists, list comprehensions, dictionary methods (update(), pop(), items(), etc.)
    • Functions: default and keyword arguments, return vs print, lambda functions
    • File Handling – text files: read, write, append, using with, line-by-line reading, writing logs/reports
  9. Web Development
    • Types: front-end (client-side), back-end (server-side), full-stack development
    • Web Design
    • Web Hosting & Deployment
    • Web Development Tools
    • Web Security
    • Web Performance Optimization
  10. Working with Databases using MS Access / DBMS
    • Querying: set conditions using relational/logical operators, multiple conditions
    • Working with Multiple Databases: relationships (1-1, 1-many, many-1, many-many)
    • Object Linking & Embedding: linking vs embedding, inserting/linking external objects

Section 2: Achievers Section

  • Higher Order Thinking Questions – Syllabus as per Section 1.
  • Questions are based on Windows 11 and MS Office 2016.

Sample Questions

Q.1 Q.2 Q.3 Q.4 Q.5 Q.6 Q.7 Q.8 Q.9 Q.10

Q.1

In data organisation, what is the role of database tables and fields?

Q.2

In Microsoft Excel, which function would you use to find the average of a range of cells, say from A1 to A10?

Q.3

Which of the following is a type of software that controls the internal operations of the computer and controls how well the computer works with its parts?

Q.4

Match the following:

 

Column A

 

Column B

1.      

Community cloud

a.      

The software that manages this cloud responds to cloud bursts by provisioning extra resources from the public cloud as required.

2.      

Private cloud

b.      

This cloud is a truly shared facility that allows multiple clients to use the resources provided. It is the closest to the definition of a cloud infrastructure.

3.      

Public cloud

c.       

It is a shared computing infrastructure that is used by a specified community of users that have common needs in terms of specifications.

4.      

Hybrid cloud

d.      

Only one organisation uses this cloud and normally the physical server racks are also present on the organisation’s premises.

Q.5

Which protocol is used for a reliable and fool-proof data transmission over the network?

Q.6

Fill in the blanks in context to HTML:

(i) The __________ list is used when the list items are not to be displayed in any particular order.
(ii) The three values that can be defined with ___________ tag are disc, square and circle.
(iii) The __________ tag is used to display the list of items in a specific order.
(iv) To specify the starting point of the numbering scheme __________ attribute is used.
(v) If one set of elements is embedded within another set, it is called __________ list.

Q.7

Which of the following statement(s) is/are correct for the use of packet switching?

Q.8

Which of the following method is used to create queries in MS Access?

Q.9

What is the main purpose of memory management in an operating system?

Q.10

Which out of the following audio format can be inserted into MS Powerpoint?

Your Score: 0/10

Answers to Sample Questions from CREST Olympiads:

Q.1bQ.2aQ.3dQ.4aQ.5cQ.6dQ.7dQ.8dQ.9bQ.10b

Answers to Sample Questions from CREST Olympiads:

Q.1 : b | Q.2 : a | Q.3 : d | Q.4 : a | Q.5 : c | Q.6 : d | Q.7 : d | Q.8 : d | Q.9 : b | Q.10 : b

70%