Skip to main content

How often Should You Brush Your Teeth?

Women does it better than men. Teeth should be brushed at least twice a day or after every meal. Brush your teeth before you go to bed and after you get off the bed in the morning.

A daily routine of brushing and regular dental checkups is enough to prevent tooth decay and gum disease.

You should brush your teeth well for no less than three minutes and your brush should be replaced once every three months.

And I wonder, should the teeth of other animals like cats, dogs and horses be brushed?

In the distant past, people used to brush their teeth using baking soda. Today there are many books on frugality and many of these books will mention that brushing your teeth with baking soda is money saving tip. A box of baking soda costs just a few cents. You can get a thousand brushes out of this box which will translate to less than a penny to brush one time.

But how do you brush teeth using baking soda?

1. You can create a paste from the baking soda by mixing the baking soda with a little water until you get a paste-like fluid.

2. You can put the baking soda powder directly on your brush and just start brushing and your saliva will create the paste.

The baking soda has kind of a salty taste, so it is not as a refreshing as your mint toothpaste. It is also abrasive making it an awesome cleaner. You will have to contend with small cuts here and there as baking soda is too abrasive if you are not used.

When you are done brushing, your teeth will feel squeaky clean - like you have just come back from the dentist. With only a few brushes, you should notice that your teeth are a little bit whiter than usual. Great! You will not only feel your mouth to be dentist clean but your teeth will be whiter. And not only will you save money on toothpaste but you will save money on teeth whitening products.

You can add a little mint extract to your baking soda so that your mouth can feel fresh and eliminate the halitosis that brushing with baking soda causes. This may take time to prepare every time you want to brush.

But seriously though, this may sound like a crude method of brushing your teeth but it is by far much better than not. We have people out there who go to great length of brushing teeth of their dear pets. But did you know that more than 75 per cent of the planet earth's population does not brush their teeth regularly?


Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...