CREST Cyber Olympiad Class 10 Sample Paper

Prepare your child for the CREST Cyber Olympiad (CCO) with expertly crafted sample papers for Grade 10. These free PDF downloads, along with detailed solutions, are designed to help students grasp advanced cyber and computer science concepts and perform confidently in the exam.

Why Practise CREST Cyber Olympiad Sample Papers for Grade 10?

  • Gain a thorough understanding of the exam format and question types.
  • Sharpen problem-solving skills and improve time management.
  • Identify weak areas and focus on strategic revision for better results.

Download Grade 10 CREST Cyber Olympiad Sample Paper (PDF)

Get the free Grade 10 CREST Cyber Olympiad sample paper in PDF format to boost your child's preparation and increase their chances of scoring high in the Olympiad.

>> Join CREST Olympiads WhatsApp Channel for latest updates. Sample PDF of CREST Cyber Olympiad for Class 10:


If your web browser doesn't have a PDF Plugin. Instead you can Click here to download the PDF

Syllabus:

Section 1: Computer & IT

  1. Advanced Networking & Internet Concepts
    • Ports and Protocols – e.g., port 80 for HTTP, port 443 for HTTPS
    • Public vs Private IP addresses (IPv4 basics)
    • Static vs Dynamic IP allocation (DHCP)
    • Web hosting basics – Domain, web server, hosting providers, uptime
    • Packet switching, Packet loss, Routers, Throughput
  2. Algorithms and Flowcharts
    • Algorithm Design: nested conditions, designing modular algorithms using sub-processes
    • Flowchart Techniques: loops, nested conditions (if-else, switch)
    • Iteration: using loops in algorithms (for, while)
    • Problem-Solving Activities (Algorithms): LCM & GCD, palindrome check, count vowels
    • Problem-Solving Activities (Flowcharts): simulate calculator, sort array
    • Integration with Programming Languages: convert flowcharts into working code
    • Logical Operators in Conditions (AND, OR, NOT)
  3. Computer Fundamentals
    • Operating System
    • Number System
    • User Interface
    • Memory
    • Task Management
  4. Cybersecurity and Digital Forensics
    • Digital Forensics: investigating computers, mobile phones, networks to uncover evidence
    • Digital Evidence: deleted files, emails, messages, browser history, photos/videos, network/server logs
    • Types of Digital Forensics: computer, mobile, network, cloud, memory forensics
    • Process of Digital Forensics: identification, preservation, analysis, reporting, presentation
    • Relationship Between Cybersecurity and Digital Forensics
  5. Data Management and E-commerce
    • Key Components of Data Management: collection, storage, organization, quality, security, analytics
    • Types of E-Commerce Models: B2C, B2B, C2C, C2B
    • Key Features of E-Commerce: online stores, payment systems, shopping cart, reviews, order management
    • Challenges of Data Management: privacy, security, data overload, integration, accuracy
    • Technologies Supporting Data Management: Cloud Computing, Big Data, Machine Learning & AI, DBMS
  6. Latest Developments in the Field of IT
    • Machine Learning (ML) – difference from AI, usage in prediction and personalisation
    • Green Computing – energy-efficient devices, e-waste reduction
  7. MS Office
    • MS Word
    • MS PowerPoint
    • MS Excel
    • MS Access
  8. Python Programming (Text-Based Coding)
    • Use of Python Modules: math, random, datetime, statistics
    • Data Validation and Error Handling
    • List & Dictionary: nested lists, list comprehensions, dictionary methods (update(), pop(), items(), etc.)
    • Functions: default and keyword arguments, return vs print, lambda functions
    • File Handling – text files: read, write, append, using with, line-by-line reading, writing logs/reports
  9. Web Development
    • Types: front-end (client-side), back-end (server-side), full-stack development
    • Web Design
    • Web Hosting & Deployment
    • Web Development Tools
    • Web Security
    • Web Performance Optimization
  10. Working with Databases using MS Access / DBMS
    • Querying: set conditions using relational/logical operators, multiple conditions
    • Working with Multiple Databases: relationships (1-1, 1-many, many-1, many-many)
    • Object Linking & Embedding: linking vs embedding, inserting/linking external objects

Section 2: Achievers Section

  • Higher Order Thinking Questions – Syllabus as per Section 1.
  • Questions are based on Windows 11 and MS Office 2016.

Sample Questions

Q.1 Q.2 Q.3 Q.4 Q.5 Q.6 Q.7 Q.8 Q.9 Q.10

Q.1

In an OLE (Object Linking and Embedding) scenario, what is a disadvantage of linking external objects?

Q.2

What type of digital evidence would forensic investigators look for when investigating a data breach in an organization?

Q.3

In Microsoft Word, which feature allows you to create a professional-looking document with predefined styles, such as headers, footers, and page numbers?

Q.4

Which of the following logical operators would you use to combine two conditions that both need to be true?

Q.5

Which of the following best ensures that stored data is not lost in case of hardware failure?

Q.6

Match the following:

 

Column A

 

Column B

1.      

Community cloud

a.      

The software that manages this cloud responds to cloud bursts by provisioning extra resources from the public cloud as required.

2.      

Private cloud

b.      

This cloud is a truly shared facility that allows multiple clients to use the resources provided. It is the closest to the definition of a cloud infrastructure.

3.      

Public cloud

c.       

It is a shared computing infrastructure that is used by a specified community of users that have common needs in terms of specifications.

4.      

Hybrid cloud

d.      

Only one organisation uses this cloud and normally the physical server racks are also present on the organisation’s premises.

Q.7

What is the hexadecimal value of the color red?

Q.8

Fill in the blanks in context to DBMS:

(i) A database stores and processes data in the form of ___________.
(ii) A primary key should never contain ____________ values.

Q.9

Which layer is international standard organisation's OSI model responsible for creating and recognising frame boundaries?

Q.10

What is the result of `mylist = [4, 5, 8]; mylist.pop()`?

Your Score: 0/10

Answers to Sample Questions from CREST Olympiads:

Q.1cQ.2bQ.3aQ.4aQ.5cQ.6aQ.7aQ.8cQ.9bQ.10b

Answers to Sample Questions from CREST Olympiads:

Q.1 : c | Q.2 : b | Q.3 : a | Q.4 : a | Q.5 : c | Q.6 : a | Q.7 : a | Q.8 : c | Q.9 : b | Q.10 : b

70%