Since the beginning of PCs, one of the important design principles for operating systems has been the principle of least privileges. (You can Google that phrase for more information.) It means that user accounts (among other things) should have no more than the minimum permissions needed to accomplish their role. This is done to limit the damage from a successful attack.
Computers and their users need to be protected against attack because they routinely deal with other computers and other users whom they cannot see or trust. Even if you are the only person who will ever use your computer, even if you live in a cave in an undisclosed location where nobody can find you, as soon as you connect to the internet, your computer becomes connected to thousands of computers that are in turn connected to thousands of computers, any of which can be operated by attackers who are actively gunning for your computer. Only the naive deny this unfortunate fact of computer-dom.
The principle of least privileges is why we do not do our day-to-day computing from an Administrators account. If you are a Standard user, and your account gets hacked, the most an attacker can do is to rifle through your personal files, which is not a worthwhile use of an attacker's time. If attackers are looking for bank account numbers, credit card information, Social Security Numbers, and the like, they can easily and cheaply find thousands of people's records on the dark web. They are unlikely to waste their time on your user account.
But if you're using an Administrators account that gets hacked ... that's the grand prize. Now the attacker has an entire computer to work with, and with that computer they can do tremendous damage, not only to your computer - for example, by using it to mine bitcoin, or torrent stolen content - but to other computers too, by using your computer to attack other computers.
If you're using a Users account, and you need to elevate your privileges temporarily, to install software, let's say, you can easily 'Run as' the installer, which means to run the installer as if you were an Administrators account. That gives you elevated permissions for that transaction only after which you revert to a Users permissions. And that's the safe way to use a computer.