wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Dal Bafla Recipe

profile
Pratik More
Jan 04, 2022
2 Likes
0 Discussions
272 Reads

Dal Bafla is a dish similar to Rajasthani Dal Baati which is one of the most popular dishes of Rajasthani cuisine.

Dal Bafla or Bafla Bati is a famous food of western India. Bafla is a popular dish of Rajasthan and Madhya Pradesh. The origin of ‘bafla baati‘ is Malwa region in the Indian State of Madhya Pradesh. And these ghee (clarified butter) packed wheat dough balls ‘Bafla Bati’ are tremendously popular in both the above mentioned states.

For Bafla:

2 Cups Wheat Flour

1/4 Cup Corn Flour

1 tsp Cumin Seeds

1/4 tsp Ajwain

1 tsp Salt

1/2 Cup Ghee

1/2 Cup Water

1 1/2 tsp Salt

1/2 tsp Turmeric

For Dal:1 1/2 Cups Soaked Arhar Dal

1 Cup Water

1/2 tsp Turmeric

1 tsp Salt

 For Tadka:1 Tbsp Ghee

1/4 tsp Hing

1/2 tsp Mustard Seeds

1 tsp Red Chilli Powder

1/2 tsp Sugar

3 Tbsp Coriander Leaves

How to Make Dal Bafla

Prepare Bafla:

Take wheat flour in a bowl and add maize flour, cumin seeds, ajwain and salt to it.Mix them well and pour ghee on to it.Mix it well.Now add water and make dough out of the mixture.Make small round balls out of the dough.Now heat some water in a pan and add salt and turmeric.Put the balls into the pan and let it cook. Cook till they float on the surface, then drain the water and make it dry.Now grill them on 200 degree celsius for about 20-30 minutes.

Prepare Dal. 

Take soaked Arhar dal and water in a pressure cooker.Add turmeric and salt. Pressure cook it.

Prepare Tadka.

Take ghee in a pan, add hing and mustard seeds. Saute well.Then add red chilli powder.Mix and pour over the cooked dal.Add sugar and coriander leaves. Mix well. Serve hot with Dal poured over Bafla. 

 


Comments ()


Sign in

Read Next

Uber

Blog banner

ADIDAS

Blog banner

IoT Architecture Based Security

Blog banner

Memory Management of Operating System(OS)

Blog banner

indian premier league

Blog banner

Memory Management

Blog banner

Direct Memory Access

Blog banner

Data Science in Healthcare: Predicting Diseases

Blog banner

Is Your Password Complex Enough?

Blog banner

Study on cyber and network forensic in computer security management

Blog banner

New Horizon Europe project ‘EvoLand’ sets off to develop new prototype services.

Blog banner

What is Spyware? and examples of them.

Blog banner

VIRTUAL MACHINE

Blog banner

Phishing

Blog banner

Fault Tolerance

Blog banner

What is thread and multithreading ?

Blog banner

Music is life

Blog banner

What is Password Cracking ? and it's Techniques.

Blog banner

ProofHub

Blog banner

How to Avoid being a Victim of Cybercrime

Blog banner

The Power of Cyber Forensic in Solving Crimes

Blog banner

Khau Galli – Vile Parle

Blog banner

MENDELEY

Blog banner

A Deep Dive

Blog banner

Memory Management

Blog banner

Modern OS

Blog banner

Uniprocessor scheduling

Blog banner

How the mobile IP is used in GSM architecture.

Blog banner

Importance of Website

Blog banner

Cache memory

Blog banner

How to use GIT & GITHUB

Blog banner

Big O Notation

Blog banner

The Role of Data Provenance and Lineage in Modern Data Science

Blog banner

How return on investment is defined in IT services

Blog banner

PHISHING

Blog banner

How to Conquer Depression ?

Blog banner

security controls

Blog banner

Operating System

Blog banner

Security issues

Blog banner

Secure Hypertext transfer protocol

Blog banner

Stephen Hawking : A Remarkable Physicist

Blog banner

AI and cyber Security

Blog banner