Enhance your child's preparation for the CREST Cyber Olympiad (CCO) with specially designed sample papers for Grade 5. These free PDFs, complete with step-by-step solutions, help students build a strong grasp of essential cyber and computer knowledge.
Why Use CREST Cyber Olympiad Sample Papers for Grade 5? Understand the exam structure and commonly asked questions. Improve time management and answering speed under exam conditions. Recognize and work on weak areas for better performance. Download Grade 5 CREST Cyber Olympiad Sample Paper (PDF) Get the free Grade 5 CREST Cyber Olympiad sample paper in PDF format to support focused and effective exam preparation.
>> Join CREST Olympiads WhatsApp Channel for latest updates. Sample PDF of CREST Cyber Olympiad for Class 5:
If your web browser doesn't have a PDF Plugin. Instead you can Click here to download the PDF
Syllabus:
Section 1: Computer & IT
Computer System
Hardware and Software
Input and Output Devices
Primary and Secondary Memory
Memory Units; Operating System
RAM/ROM, Solid State Drive (SSD), Hard Disk Drive (HDD), Servers
MS Word
Paragraph Formatting using Paragraph Group
Drop Cap
Document Views
Inserting Graphics: Pictures and Shapes
Clip Arts
Symbols
SmartArt
Multimedia Objects
Text Box
Inserting Header and Footer in a Document
Charts and Tables
MS PowerPoint
Inserting Graphics: Pictures and Shapes
Clip Arts
Symbols
SmartArt
Multimedia Objects
Text Box
Inserting Header & Footer and Exploring its Features
Running Slideshow
Presentation Views
MS Excel
Formatting Cells
Working with Formulas and Functions
Managing Worksheets
Charts and Graphs
Troubleshooting
Basic Troubleshooting Steps: Restart the device, Check connections
(unplugged power cables or loose USBs), Understand simple error messages
Common Issues and Solutions:
Computer won’t turn on – Check power supply and cables
Frozen screen – Close an unresponsive application
Keyboard or mouse not working – Plug them in correctly
Concept of Authentication
Authentication and its Types
Authentication in Daily Life
User, Accounts and Profiles
Cyber Security and Safety
Malwares: Virus, Worms, Trojan, Spyware
Basic Security Concepts: Phishing, Identity Theft, Cyber Stalking, Cyberbullying, Flaming
Network and Communication
Types of Networks: PAN, LAN, MAN, WAN
Domain and Servers
Wireless Connections: Wi-Fi, Bluetooth, Cellular (4G–5G), NFC
ISP: Jio, Airtel, Vodafone Idea (Vi), BSNL
Email and Creating an Account
Task Manager
Processes
Performance
App History
Startup Apps
Users
Latest Developments in the Field of IT
Voice Assistants in Daily Life
Cloud Storage: Google Drive, OneDrive, Dropbox, iCloud
Section 2: Achievers Section
Higher Order Thinking Questions – Syllabus as per Section 1.
Questions are based on Windows 11 and MS Office 2016.
Sample Paper
Previous Year Paper
Marking Scheme
Sample Questions
Q.1
What is the default font size of a new Word document based on normal template?
a) 10pt
b) 11pt
c) 12pt
d) 8pt
Q.2
Which of the following options cannot be used to close a window?
a) Press Alt + F4
b) Open file tab and click Exit
c) Click X on the upper right corner of the window
d) Click on the Tab button
Q.3
What happens If you try to save a 2GB file to a floppy disc (1.44MB), what will happen??
a) It will store partially.
b) It will ask to split the file.
c) It will give an error.
d) It will compress the file.
Q.4
Which of the following is a collection of information that determines which files you can access and which settings you use?
a) Network
b) User Account
c) Operating System
d) File System
Q.5
Which of the following options best describe the purpose of using 'Drop Cap' in MS Word?
a) Makes the first letter of the first word at beginning of paragraph in large capital letter
b) Makes the first letter of word at beginning of sentence in capital letter
c) Makes the first letter of each word in capital letter
d) Drop all capital letters from a paragraph
Q.6
Match the following:
Column-I
Column-II
1.
1 Byte
a.
Secondary Memory
2.
RAM
b.
8 bits
3.
PROM
c.
Ultraviolet Light
4.
EPROM
d.
Once programmer, cannot be erased
5.
Pen Drive
e.
Volatile Memory
a) 1 – b, 2 – e, 3 – d, 4 – c, 5 – a
b) 1 – b, 2 – c, 3 – e, 4 – d, 5 – a
c) 1 – a, 2 – b, 3 – d, 4 – c, 5 – e
d) 1 – a, 2 – e, 3 – d, 4 – c, 5 – b
Q.7
What is the name given to the Client Program (software) that is used to look at various kinds of Internet resources?
a) Address Book
b) Provider
c) Browser
d) Protocol
Q.8
Videos and music on a computer can be played using which of the following applications?
a) Microsoft Office
b) CorelDrawX4
c) Media Player
d) Norton Anti Virus
Q.9
Which of the following type of components is available in a dual-core version?
a) RAM
b) CPU
c) SSD
d) PCI Card
Q.10
Which of these daily activities most likely involves two-factor authentication?
a) To Print important documents
b) Connecting to Wifi network
c) Logging into email
d) Pairing bluetooth device
Your Score: 0 /10
Answers to Sample Questions from CREST Olympiads:
Q.1 b Q.2 d Q.3 c Q.4 b Q.5 a Q.6 a Q.7 c Q.8 c Q.9 b Q.10 c
Answers to Sample Questions from CREST Olympiads:
Q.1 : b | Q.2 : d | Q.3 : c | Q.4 : b | Q.5 : a | Q.6 : a | Q.7 : c | Q.8 : c | Q.9 : b | Q.10 : c