SlideShare a Scribd company logo
1 of 16
CAN MIRAVITGES LES BALENES I ELS DOFINS FEM MELMELADES CURS 2009-2010
ELS INGREDIENTS ,[object Object],[object Object],[object Object]
ELS ESTRIS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PROCÉS D’ELABORACIÓ
Pelem  la fruita
Ja tenim la fruita tallada a trossos.
Triturem bé la fruita.
Mentrestant tallem la pell de la llimona ben fineta.
Ja tenim la fruita ben desfeta.
Hi afegim el sucre.
Posem l’olla al foc i remenem bé.
Continuem remenant amb paciència.
La melmelada ja és a punt. L’Edit ens omple els pots de confitura.
Ja hem acabat! Fins la propera!
Això és tot!
A disfrutar de les melmelades!

More Related Content

Viewers also liked

Rapporti Civili 3
Rapporti Civili 3Rapporti Civili 3
Rapporti Civili 3
stranezza02
 
Cyberpolitics 2009 W5
Cyberpolitics 2009 W5Cyberpolitics 2009 W5
Cyberpolitics 2009 W5
oiwan
 
Cost-effective approach to full-cycle vulnerability management
Cost-effective approach to full-cycle vulnerability managementCost-effective approach to full-cycle vulnerability management
Cost-effective approach to full-cycle vulnerability management
Sasha Nunke
 
Cyberpolitics2009w4
Cyberpolitics2009w4Cyberpolitics2009w4
Cyberpolitics2009w4
oiwan
 
Diversity Plus Article Agl Resources 2009
Diversity Plus Article   Agl Resources 2009Diversity Plus Article   Agl Resources 2009
Diversity Plus Article Agl Resources 2009
Tarece Johnson Hassell
 
Cyberpolitics 2009 W2
Cyberpolitics 2009 W2Cyberpolitics 2009 W2
Cyberpolitics 2009 W2
oiwan
 
La coruña
La coruñaLa coruña
La coruña
C FM
 

Viewers also liked (20)

Dialog prestasi SK Tenang Stesen
Dialog prestasi SK Tenang StesenDialog prestasi SK Tenang Stesen
Dialog prestasi SK Tenang Stesen
 
Rapporti Civili 3
Rapporti Civili 3Rapporti Civili 3
Rapporti Civili 3
 
Rain
RainRain
Rain
 
Carbonara coding
Carbonara codingCarbonara coding
Carbonara coding
 
Cyberpolitics 2009 W5
Cyberpolitics 2009 W5Cyberpolitics 2009 W5
Cyberpolitics 2009 W5
 
2015 Back To School Transformation Challenge
2015 Back To School Transformation Challenge2015 Back To School Transformation Challenge
2015 Back To School Transformation Challenge
 
Pangkor
PangkorPangkor
Pangkor
 
Cost-effective approach to full-cycle vulnerability management
Cost-effective approach to full-cycle vulnerability managementCost-effective approach to full-cycle vulnerability management
Cost-effective approach to full-cycle vulnerability management
 
Cyberpolitics2009w4
Cyberpolitics2009w4Cyberpolitics2009w4
Cyberpolitics2009w4
 
Ei09 Opposite Green
Ei09 Opposite GreenEi09 Opposite Green
Ei09 Opposite Green
 
Desktop, Embedded and Mobile Apps with Vortex Café
Desktop, Embedded and Mobile Apps with Vortex CaféDesktop, Embedded and Mobile Apps with Vortex Café
Desktop, Embedded and Mobile Apps with Vortex Café
 
BJF.Delta.Nov Redesigned ELA Curriculum K-3
BJF.Delta.Nov Redesigned ELA Curriculum K-3BJF.Delta.Nov Redesigned ELA Curriculum K-3
BJF.Delta.Nov Redesigned ELA Curriculum K-3
 
Diversity Plus Article Agl Resources 2009
Diversity Plus Article   Agl Resources 2009Diversity Plus Article   Agl Resources 2009
Diversity Plus Article Agl Resources 2009
 
Cyberpolitics 2009 W2
Cyberpolitics 2009 W2Cyberpolitics 2009 W2
Cyberpolitics 2009 W2
 
Vsb sec lit #1
Vsb sec lit #1Vsb sec lit #1
Vsb sec lit #1
 
Vortex Tutorial -- Part I
Vortex Tutorial -- Part IVortex Tutorial -- Part I
Vortex Tutorial -- Part I
 
La coruña
La coruñaLa coruña
La coruña
 
Hoa Roles & Responsiblities
Hoa Roles & ResponsiblitiesHoa Roles & Responsiblities
Hoa Roles & Responsiblities
 
Formación en centro 15 16
Formación en centro 15 16Formación en centro 15 16
Formación en centro 15 16
 
Bridging Gt Apr09
Bridging Gt Apr09Bridging Gt Apr09
Bridging Gt Apr09
 

FEM MELMELADA