Skip to main content

how to play Hey Jude in key of D



Quick lesson on how to play Hey Jude in key of D
Hey Jude lyrics    Play
Songwriters: Mccartney, Paul; Lennon, John;

Hey Jude, don't make it bad
Take a sad song and make it better
Remember to let her into your heart
Then you can start to make it better

Hey Jude, don't be afraid
You were made to go out and get her
The minute you let her under your skin
Then you begin to make it better

And anytime you feel the pain, hey Jude, refrain
Don't carry the world upon your shoulders
For well you know that it's a fool who plays it cool
By making his world a little colder
Na na na, na na, na na na na

Hey Jude, don't let me down
You have found her, now go and get her
Remember to let her into your heart
Then you can start to make it better

So let it out and let it in, hey Jude, begin
[. From: http://www.elyrics.net/read/b/beatles-lyrics/hey-jude-lyrics.html .]
You're waiting for someone to perform with
And don't you know that it's just you? Hey Jude, you'll do
The movement you need is on your shoulder
Na na na, na na, na na na na, yeah

Hey Jude, don't make it bad
Take a sad song and make it better
Remember to let her under your skin
Then you begin to make it better
Better, better, better, better, better, oh!

Na na na, na-na na na
Na-na na na, hey Jude
Na na na, na-na na na
Na-na na na, hey Jude

Na na na, na-na na na
Na-na na na, hey Jude
Na na na, na-na na na
Na-na na na, hey Jude

Na na na, na-na na na
Na-na na na, hey Jude
Na na na, na-na na na
Na-na na na, hey Jude



Comments

Popular posts from this blog

Make Post by Sending Email

I'm creating a Post in my site by sending an Email. Hi guys let me attach an image of me posing lets see   I'm creating a Post in my site by sending an Email. Hi guys let me attach an image of me posing   It will make a well defined post about posting post by email; anyone can post by just sending email to that specific address…   Steps How to Set Up Mail-to-Blogger Steps 1 Open Internet browser and log in to an administrator account for your Blogger blog. Step 2 Click the "Settings" tab and then click "Email." Scroll down to the "Mail-to-Blogger Address" section. Step 3 Enter a secret word in the Mail-to-Blogger Address box. The address is in the format of " username.secretword@blogger.com ," where "username" is your Blogger username and "secret word" is the word you entered in the box. Username is mostly your email id And secret is what you create Step 4 Cl...

Starting An E-Commerce Company

   You can register yourself by filling out the relevant business structure paperwork with the IRS, or you can hire a company to register for you. Lawyers are another option, but for the average small business owner they are exaggerated.              Step 5: Select your e-commerce platform and create your website. By that time, you have completed all the formalities necessary to register and launch your e-commerce business. In a way, most of our steps reflect the process of starting a brick-and-mortar business.      Now that you have prepared your products and services, listed them in your online shop and put your website into operation, you are ready to serve customers. To do this, of course, you need to market your e-commerce business. So there you have it, you have learned how to start an e-commerce company.       Now that you have a business idea, it's time to delve deeper into product viability. Before you start selling, you need to find...

Cybersecurity: Protect Your Privacy From Hackers

     Call it anti-hacker software or go a bit further, but it will not stop a determined hacker from using such software to make it more difficult for hackers to get into your computer and access your data. For example, browser plugins can be used to prevent websites from tracking you. While Facebook can still track you when it's open, you don't have to be there all the time to track your browsing history, which can then be used to deliver targeted ads.       You can protect your computer by using a firewall and antivirus software and adhering to best practices for computer use. You can also protect your mobile devices by turning off Bluetooth when it is not in use, paying attention to the Wi-Fi network you are connected to, and using security applications to improve monitoring and protection.       As already mentioned, Internet-connected televisions and devices are widely available on the market. It is important to protect these devices, just like computers and smartphones. T...