I am so glad you made that rim shot, said the trooper, because if you pirates so much as litter the streets again, I'll put you inside until your chrome rusts. Do you copy that?
Okey-dokey, Smokey, yawned Wulff.
To prevent these gaps from being a problem, write your code to fail fast. Use assertions to signal the limits of your design; if someone tries to use something that isn't implemented, the assertion will cause his tests to fail.
The only compensation he could get seems to have been to botanize and zoologize, as it were, on his visitors.
For example, a hacker might write a quine virus program that generates complete copies of itself as part of its output, a worm virus program that reproduces itself across a network, or a wabbit virus program designed to perpetually duplicate itself, at least until the system crashes. In contrast to the wabbit's slow growth, a fork bomb quickly generates multiple copies itself.