Prepare your child for the CREST Cyber Olympiad (CCO) with expertly crafted sample papers for Grade 10. These free PDF downloads, along with detailed solutions, are designed to help students grasp advanced cyber and computer science concepts and perform confidently in the exam.
Why Practise CREST Cyber Olympiad Sample Papers for Grade 10? Gain a thorough understanding of the exam format and question types. Sharpen problem-solving skills and improve time management. Identify weak areas and focus on strategic revision for better results. Download Grade 10 CREST Cyber Olympiad Sample Paper (PDF) Get the free Grade 10 CREST Cyber Olympiad sample paper in PDF format to boost your child's preparation and increase their chances of scoring high in the Olympiad.
>> Join CREST Olympiads WhatsApp Channel for latest updates. Sample PDF of CREST Cyber Olympiad for Class 10:
If your web browser doesn't have a PDF Plugin. Instead you can Click here to download the PDF
Syllabus:
Section 1: Computer & IT
Advanced Networking & Internet Concepts
Ports and Protocols – e.g., port 80 for HTTP, port 443 for HTTPS
Public vs Private IP addresses (IPv4 basics)
Static vs Dynamic IP allocation (DHCP)
Web hosting basics – Domain, web server, hosting providers, uptime
Packet switching, Packet loss, Routers, Throughput
Algorithms and Flowcharts
Algorithm Design: nested conditions, designing modular algorithms using sub-processes
Flowchart Techniques: loops, nested conditions (if-else, switch)
Iteration: using loops in algorithms (for, while)
Problem-Solving Activities (Algorithms): LCM & GCD, palindrome check, count vowels
Problem-Solving Activities (Flowcharts): simulate calculator, sort array
Integration with Programming Languages: convert flowcharts into working code
Logical Operators in Conditions (AND, OR, NOT)
Computer Fundamentals
Operating System
Number System
User Interface
Memory
Task Management
Cybersecurity and Digital Forensics
Digital Forensics: investigating computers, mobile phones, networks to uncover evidence
Digital Evidence: deleted files, emails, messages, browser history, photos/videos, network/server logs
Types of Digital Forensics: computer, mobile, network, cloud, memory forensics
Process of Digital Forensics: identification, preservation, analysis, reporting, presentation
Relationship Between Cybersecurity and Digital Forensics
Data Management and E-commerce
Key Components of Data Management: collection, storage, organization, quality, security, analytics
Types of E-Commerce Models: B2C, B2B, C2C, C2B
Key Features of E-Commerce: online stores, payment systems, shopping cart, reviews, order management
Challenges of Data Management: privacy, security, data overload, integration, accuracy
Technologies Supporting Data Management: Cloud Computing, Big Data, Machine Learning & AI, DBMS
Latest Developments in the Field of IT
Machine Learning (ML) – difference from AI, usage in prediction and personalisation
Green Computing – energy-efficient devices, e-waste reduction
MS Office
MS Word
MS PowerPoint
MS Excel
MS Access
Python Programming (Text-Based Coding)
Use of Python Modules: math, random, datetime, statistics
Data Validation and Error Handling
List & Dictionary: nested lists, list comprehensions, dictionary methods (update(), pop(), items(), etc.)
Functions: default and keyword arguments, return vs print, lambda functions
File Handling – text files: read, write, append, using with, line-by-line reading, writing logs/reports
Web Development
Types: front-end (client-side), back-end (server-side), full-stack development
Web Design
Web Hosting & Deployment
Web Development Tools
Web Security
Web Performance Optimization
Working with Databases using MS Access / DBMS
Querying: set conditions using relational/logical operators, multiple conditions
Working with Multiple Databases: relationships (1-1, 1-many, many-1, many-many)
Object Linking & Embedding: linking vs embedding, inserting/linking external objects
Section 2: Achievers Section
Higher Order Thinking Questions – Syllabus as per Section 1.
Questions are based on Windows 11 and MS Office 2016.
Sample Paper
Previous Year Paper
Marking Scheme
Sample Questions
Q.1
Which of these algorithms is used to find the GCD (Greatest Common Divisor) of two numbers?
a) Vowel counting method
b) LCM calculation
c) String reversal method
d) Euclidean algorithm
Q.2
What device separates a single network into two segments but lets the two segments appear as one to higher protocols?
a) Switch
b) Bridge
c) Gateway
d) Router
Q.3
Which command will take you to the first slide of your presentation in MS PowerPoint?
a) Ctrl + End
b) Ctrl + Home
c) Next Slide Button
d) Page Up
Q.4
How does a for loop differ from a while loop in algorithms?
a) A for loop runs with a known count; a while loop runs till a condition.
b) A for loop repeats endlessly; a while loop ends at a fixed count.
c) A for loop cannot use logic; a while loop can use logical checks.
d) A for loop is always slower; a while loop is faster in all cases.
Q.5
A company collects real-time data from website visits, app usage, and social media. What problem might arise?
a) Better product photography
b) Data overload without proper filters
c) Fewer customer sign-ups
d) Reduced shipping fees
Q.6
Which of the following is not a type of basic model available in E-governance?
a) Government - to - citizen, Government - to - social welfare
b) Government - to - social welfare, Government - to - government
c) Government - to - employers, Government - to - social welfare
d) Government - to - government, Government - to - employers
Q.7
Which of the following is the correct HTML tag to left-align the content inside a table cell?
a) <tdleft>
b) <td ralign = "left">
c) <td align = "left">
d) <tdleftalign>
Q.8
In an OLE (Object Linking and Embedding) scenario, what is a disadvantage of linking external objects?
a) The object data is permanently stored inside the database
b) The linked object cannot be updated
c) The external object must be accessible for the link to work
d) The link always breaks
Q.9
What is web performance optimization?
a) Increasing the quality of the website's design
b) Securing the website from attacks
c) Adding more features to the website
d) Making the website load faster and more efficiently
Q.10
Which of the following method is used to create queries in MS Access?
a) You can drag and drop fields on query builders
b) You can type the SQL command in SQL view.
c) You can use query wizard or design view.
d) Any of the above method will work
Your Score: 0 /10
Answers to Sample Questions from CREST Olympiads:
Q.1 d Q.2 b Q.3 b Q.4 a Q.5 b Q.6 c Q.7 c Q.8 c Q.9 d Q.10 d
Answers to Sample Questions from CREST Olympiads:
Q.1 : d | Q.2 : b | Q.3 : b | Q.4 : a | Q.5 : b | Q.6 : c | Q.7 : c | Q.8 : c | Q.9 : d | Q.10 : d