What is the use of REPORT statement?

What is the use of REPORT statement? Correct Answer To print any string or output the string

The REPORT statement is used to output any message to the screen. It is generally used in conjunction with the ASSERT statement where ASSERT checks the consistency and REPORT outputs the message specified by a user.

Related Questions

In the question below is given a statement numbered I, II and III. An assumption is something supposed or taken for granted. You have to consider the following assumption and decide which of the assumption is implicit in the statement. Statement: Summer is slowly fading away, but the sales of super premium and craft beers continue to sizzle. And now the FIFA World Cup football in Russia, as many football fans head out to the pubs every evening to watch matches, is adding some more fizz to the market. For young millennials, especially in Indian metros, it’s also time to seek out new craft and super-premium beers. According to a report by Euromonitor International last year, there is likely to be a further rise of craft beers in India this year. The report says that the huge success of B9 Beverages’ Bira 91 is expected to further encourage many global players to introduce their own craft beers.  Assumptions: I. Additionally, with this category being largely underdeveloped, many new players are also expected to emerge.  II. Likewise, a recent report by BMI Research of Business Monitor International, too, sees a strong growth for the beer market in India in 2018 on the back of changing cultural attitudes and a young, increasingly affluent population, demand for premium and craft beers is rapidly emerging. III. With growth in demand from Indian beer connoisseurs, who don’t mind paying a premium, it’s no surprise that importers and local brewers have launched over 20 new and fresh flavours this summer, including niche craft beers produced in small breweries.
In the question below, are given a statement followed by three courses of actions numbered I, II and III. On the basis of the information given, you have to assume everything in the statement to be true, and then decide which of the suggested course of action logically follow (s) for pursuing. Statement: The India Risk Survey 2017 report ranks 'Information & Cyber Insecurity' as the biggest risk facing Indian companies. Indian organizations, both public and private, had witnessed over 27,000 incidents of security threat, from January 2017 till June 2017 alone. Phishing, scanning/probing, website intrusions and defacements, virus/malicious code, ransomware, Denial of Service attacks, and data breaches are some ways in which hackers attack business websites, which can cause operational disruptions and potentially steal sensitive information. Small and medium businesses (SMBs), unfortunately, have been seeing rising incidences of cybercrime. In fact, 70 percent of cyberattacks occur at organizations with lesser than 100 employees  Courses of action: I. Mandate basic security practices and policies for all employees, such as 2-factor authentication, internet use guidelines and create and enforce rules on handling and protecting sensitive data. Conduct frequent training to sensitize employees about opening suspicious emails, encrypting their data, using strong passwords on their devices, installing security apps, and limiting activity over public Wi-Fi. Implement and enforce incident reporting to help ensure that even the smallest breach is report to management as well as the IT teams. II. Basics still matter and are some of the best defenses against viruses, malware, and other online threats. Assess the assets that are most at risk - data, servers, network - and ensure that the systems are updated with the latest security software, web browser, and operating system. Implement firewall security and run antivirus software after each update.  III. Ensure regular backup of all critical data - whether stored in-house or on the cloud. Run scheduled attack drills and stress tests to identify vulnerabilities and ensure that data restoration and business continuity are executed as planned.