Current best practices recommend using an unprivileged user for normal operations, mainly to minimize possible mistakes that could damage the system. That being said, is common to use the sudo command to give temporary root privileges to normal users for doing administrative tasks, like reconfiguring or installing packages, like this example (installing and configuring an ntpd daemon for network time sync):
sudo apt install ntp
sudo nano /etc/ntp.conf
sudo systemctl restart ntp
If the user has authorization, sudo asks for the user's password before executing the command indicated (this validation is cached some time so we haven't to insert the password at every sudo command).
For this to work, the normal user has to be directly authorized in the file /etc/sudoers or must be a member of a group authorized in that file. To see the actual configuration, use less /etc/sudoers. To edit the file, we should use the command visudo with root privileges, which will check for possible syntax errors or if the file is being edited right now in another shell (To find the visudo configuration sentences, use the man sudoers command).
A lot of modern Linux distros (in particular those Debian based) have this file preconfigured with the user indicated in the installation process, and the root user disabled and without a password assigned, precisely to highlight the more secure practice of system administration.
In any case, there are situations where all the activities in some session will be admin-related, and having to insert sudo in all commands could be a hassle. In that case, use:
sudo su -
to execute a login shell as root after auhenticating sudo, and that shell will not need sudo to run admin commands. To return to the normal user shell, insert the command exit. You can have several terminals, one of them as root, and the rest as normal user, but you have always to be careful when making changes to the system and read the relevant documentation to be aware of possible caveats.
Of course, if your system/distro does not have the /etc/sudoers file configured (or if it hasn't the sudo command installed), you cannot use sudo, so it should have a root account and you must know its password.
Some systems allow to enter some kind of 'recovery mode' at boot, but new distros can ask for the root password (or the password of a sudo user) to enter a shell or even to select GRUB options to protect against unauthorized access. In that case, is necessary to use some other root recovery method.