Skip to main content

厨余的有效处理方法及施肥

 发信人: hqtrading (HQTradingCo), 信区: gardening
标  题: 厨余的有效处理方法及施肥
发信站: BBS 未名空间站 (Thu Dec  3 19:27:46 2020, 美东)

试过N种厨余的处理方法,最简单的是把厨余切或剪成小块,倒地里和土混合,上面再
盖一层土,厨余发酵分解会产生大量水分,所以不用额外浇水,天气热厨余两周左右就
分解,可以种菜了。

施肥氮肥很容易弄,磷肥可以用虾皮,到华人超市买一袋带头带壳的虾,把头和壳剥掉
,放点水用粉碎机打碎,分袋装好进冻室保存,使用之前提前两周拿出放容器里发酵;
钾肥就用香蕉皮或草木灰,香蕉皮整块冻起来,使用的时候提前两周拿出,加水用搅拌
机打碎,发酵后再使用;钙肥用鸡蛋壳粉。

下雨天可以收集些雨水,天然的氮肥; 蔬果园里的草落叶树枝藤蔓都可以循环利用,用
带套子的除草机碾轧,然后把套子里的碎枝叶埋土里增加土壤疏松度,增肥。

我家的有机蔬果园这样种植有段时间了,效果不错。自家种植的有机蔬果味道实在好,
所有的蔬菜都比店里卖的好吃很多。对食物口感痴迷的人来说,值!

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...