Use the separate chaining collision resolution strategy while
implementing the hash table.
Second, create a Java application that reads the name of the input file containing the tweets
as a command-line argument (i.e., do not hardcode the name and do not prompt the user to
enter it). If the filename is not specified, or if the file does not exist or cannot be opened,
display an error message and terminate the program.