That’s why I always disabled UAC on my home computers.
Just disable UAC completely and you don’t need to explicitly start any program as Administrator, in fact when you run windows for the first time and create your user account for the system (the OOEB wizard), the account created is member of Administrators local group, the “security feature” that control that annoying behavior of running programs in a lower privileges security context is UAC (User Account Control). You can disable it in various way, I personally prefer the Local Group Policy Editor way.
Win Key + R -> GPEDIT.MSC -> Enter
In the Group Policy Editor window, browse to Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options.
Make the following changes:
User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode – Set its value to Elevate without prompting.
User Account Control: Detect application installations and prompt for elevation – Set its value to Disabled.
User Account Control: Only elevate UIAccess applications that are installed in secure locations – Set its value to Disabled.
User Account Control: Run all administrators in Admin Approval Mode – Set its value to Disabled.
Restart the computer.
Also, you can search on google “How to disable UAC on Windows 10”
That way, since your account is already member of the local Administrators group, all the programs you run in your windows session, run with the highest OS privileges, and without security elevation prompts.
Basically, you will really 99% own your computer, except for certain process/OS services/folders/registry keys/etc that run on the SYSTEM’s accounts. Those too can be modified by taking ownership of the respective objects, but that is another story, Windows Advanced Security shenanigans.