Computer Science

ITM Capstone

 Provide a real-world example or describe a hypothetical situation in which a legitimate organization used spam in an effective and non intrusive manner to promote a product or service. 

 Indicate at least one source or reference in your original post. You can use your textbook or current research articles. (Min 250 Words)