The number of key exchanges depend on the HTTP protocol and TLS protocol used, which depend on the capabilities and behavior of client and server.
In the best case of HTTP/2, HTTP/3 or HTTP/1 with keep-alive all requests are send over a single TLS connection, which means only one key exchange. In the worst case there will be a new TLS connection for each new request with no session resumption to the other ones. This means one key exchange per request.
If the server supports HTTP/2 or HTTP/3 it is very likely that everything will be done over one TLS connection (assuming that all requests go to the same host). These protocols support sending multiple requests at the same time (interleaved) over the same connection.
With HTTP/1 and keep-alive the requests can only be send sequentially inside the a single connection. To allow some parallel requests browsers will therefore usually open multiple TCP connections to the host, which means multiple TLS connections too. Up to TLS 1.2 this might still mean a single key exchange if the session is shared between the TLS connections. With TLS 1.3 a new key exchange is made for each new TLS connection even if a sessions gets resumed.
With HTTP/1 and no keep-alive a new TCP/TLS connection will be made for each new request. If these share the same TLS session there will be only one key exchange for TLS protocol up to TLS 1.2. Without shared session or with TLS 1.3 there will be a new key exchange for each connection.