Skip to main content

猪肝吃法有讲究

营养学界推荐吃猪肝
华中科技大学同济医学院食品与营养卫生教授周韫珍教授说,猪肝营养价值很高,含有丰富的蛋白质、维生素A和B族以及钙、磷、铁、锌等矿物质,均属人 体所必需且又容易缺乏的营养物质。营养学界经常会推荐大家吃猪肝,特别是对儿童、孕妇、乳母、老年人以及贫血等人群,猪肝一直是首选食物。
猪肝吃法有讲究
猪肝作为体内解毒和排泄某些物质的主要场所,猪肝中会积累代谢产生的毒素,分散存在于数以万计的肝血窦中。

因此,刚买回的鲜肝不要急于烹调。应将其放在自来水龙头下冲洗10分钟,然后切成片放在水中浸泡30分钟,反复换水至水清为止,以彻底清除滞留的肝血和胆汁中的毒物。浸泡肝脏的水以淡盐水为佳。
为了消灭残存在猪肝里的寄生虫卵或病菌,在烹调时,时间不能太短,至少应该在急火中炒5分钟以上,使猪肝完全变成灰褐色,看不到血丝才好。切不能贪图口感爽脆缩短加热时间。
猪肝不宜食用过多
一个人每天从食物中摄取的胆固醇不应超过300毫克,而每100克新鲜猪肝中所含的胆固醇竟高达400毫克以上,所以,高血压和冠心病患者最好不要吃猪肝。健康成人,一天吃猪肝不要超过50克。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...