In reality, however, the majority of those on the spot decisions don't have to be agonized over, because mostly they are made to elevate common Windows functions, tools or features of already installed and trusted 3rd-party programs that require elevation to access them. Although I haven't used Windows much in recent months, here is a list of Windows tasks, tools and 3rd-party installed Program features I have recently elevated with UAC prompts on Windows 11:
Windows Defender Firewall
Task Scheduler
Disk Cleanup
Command prompt
Group Policy
Bitlocker
Local Security Policy
Computer Management
OSArmor
Andy Ful's WHHL and Configure Defender
Hardware Monitor App
Every UAC prompt for the above is obviously an automatic, no-brainer "Yes" after credentials are entered, because they are known and trusted and I know for certain they require elevation either because I choose to do so or I know beforehand the program requires it. I think most people realize this. Unless Microsoft beefs UAC up with some features to enhance security, it's probably best to not count on it to protect in some or many cases, although as Andy points out a few posts above "How to use the stone tool" it can sometimes be useful to some when something unexpected occurs and hopefully a UAC bypass is not in the works when it happens.